Sciweavers

3349 search results - page 134 / 670
» Data Security
Sort
View
153
Voted
HICSS
2003
IEEE
174views Biometrics» more  HICSS 2003»
15 years 8 months ago
Semantic Interoperability in the Fixed Income Securities Industry: A Knowledge Representation Architecture for Dynamic Integrati
We examine a knowledge representation architecture to support context interchange mediation. For autonomous receivers and sources sharing a common subject domain, the mediator’s...
Allen Moulton, Stuart E. Madnick, Michael Siegel
102
Voted
HOTOS
2003
IEEE
15 years 8 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
103
Voted
PET
2007
Springer
15 years 9 months ago
Attacking Unlinkability: The Importance of Context
A system that protects the unlinkability of certain data items (e. g. identifiers of communication partners, messages, pseudonyms, transactions, votes) does not leak information t...
Matthias Franz, Bernd Meyer, Andreas Pashalidis
145
Voted
WCNC
2010
IEEE
15 years 1 months ago
Characterization of the Secrecy Region of a Single Relay Cooperative System
Abstract—Security is an important aspect for the future wireless networks. Since the number of network nodes increases constantly, and, in addition, the networks are decentralize...
Ninoslav Marina, Are Hjørungnes
127
Voted
VISUALIZATION
2002
IEEE
15 years 8 months ago
Case Study: Interactive Visualization for Internet Security
Internet connectivity is defined by a set of routing protocols which let the routers that comprise the Internet backbone choose the best route for a packet to reach its destinati...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xia...