Sciweavers

2363 search results - page 437 / 473
» How Secure is RFID
Sort
View
126
Voted
CN
1999
93views more  CN 1999»
15 years 3 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson
139
Voted
SIGKDD
2002
90views more  SIGKDD 2002»
15 years 3 months ago
Database Privacy
The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal data, rather than on confidentiality alone. This balance ...
Martin S. Olivier
163
Voted
JNW
2008
116views more  JNW 2008»
15 years 2 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
128
Voted
IPMU
2010
Springer
15 years 2 months ago
See-Through Vision: A Visual Augmentation Method for Sensing-Web
Abstract. Many surveillance cameras are being installed throughout the environments of our daily lives because they effectively maintain safety and offer security to ordinary peopl...
Yuichi Ohta, Yoshinari Kameda, Itaru Kitahara, Mas...
ITNG
2010
IEEE
15 years 2 months ago
Record Setting Software Implementation of DES Using CUDA
—The increase in computational power of off-the-shelf hardware offers more and more advantageous tradeoffs among efficiency, cost and availability, thus enhancing the feasibil...
Giovanni Agosta, Alessandro Barenghi, Fabrizio De ...