Sciweavers

956 search results - page 120 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
FOSAD
2005
Springer
15 years 3 months ago
Formal Methods for Smartcard Security
Smartcards are trusted personal devices designed to store and process confidential data, and to act as secure tokens for providing access to applications and services. Smartcards ...
Gilles Barthe, Guillaume Dufay
CORR
2006
Springer
115views Education» more  CORR 2006»
14 years 10 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
15 years 4 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin
CIDR
2003
145views Algorithms» more  CIDR 2003»
14 years 11 months ago
Distributed Computing with BEA WebLogic Server
This paper surveys distributed computing techniques used in the implementation of BEA WebLogic Server. It discusses how application servers provide a distributed transactional inf...
Dean Jacobs
WWW
2008
ACM
15 years 10 months ago
Improving personalized services in mobile commerce by a novel multicriteria rating approach
With the rapid growth of wireless technologies and mobile devices, there is a great demand for personalized services in mcommerce. Collaborative filtering (CF) is one of successfu...
Qiudan Li, Chunheng Wang, Guanggang Geng