Sciweavers

1605 search results - page 272 / 321
» E-commerce Security Issues
Sort
View
HAIS
2010
Springer
15 years 2 months ago
Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS
Abstract. Accurate and swift responses are crucial to Intrusion Detection Systems (IDSs), especially if automatic abortion mechanisms are running. In keeping with this idea, this w...
Álvaro Herrero, Martí Navarro, Vicen...
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 2 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
PKC
2001
Springer
116views Cryptology» more  PKC 2001»
15 years 2 months ago
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete l...
Hongjun Wu, Feng Bao, Robert H. Deng
SIGECOM
2000
ACM
147views ECommerce» more  SIGECOM 2000»
15 years 2 months ago
MultECommerce: a distributed architecture for collaborative shopping on the WWW
The WWW has made information and services more available than ever before. Many of the first Web applications have been emulations of real world activities, in particular, e-comme...
Stefano Puglia, Robert Carter, Ravi Jain
POPL
1999
ACM
15 years 2 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett