Sciweavers

1627 search results - page 279 / 326
» High Security Smartcards
Sort
View
TSMC
2008
172views more  TSMC 2008»
15 years 20 days ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
75
Voted
JSAC
2007
93views more  JSAC 2007»
15 years 20 days ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
TWC
2008
138views more  TWC 2008»
15 years 20 days ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
VLC
2008
146views more  VLC 2008»
15 years 20 days ago
Interactive visual analysis of geographic data on mobile devices based on dynamic queries
The capabilities of current mobile devices, especially PDAs, are making it possible to design and develop mobile applications that employ visual techniques for using geographic da...
Stefano Burigat, Luca Chittaro
103
Voted
CERA
2004
89views more  CERA 2004»
15 years 20 days ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao