Sciweavers

519 search results - page 37 / 104
» How to make secure email easier to use
Sort
View
96
Voted
AMEC
2003
Springer
15 years 2 months ago
Improving Learning Performance by Applying Economic Knowledge
Digital information economies require information goods producers to learn how to position themselves within a potentially vast product space. Further, the topography of this spac...
Christopher H. Brooks, Robert S. Gazzale, Jeffrey ...
CCS
2007
ACM
15 years 1 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
EUSAI
2007
Springer
15 years 3 months ago
Evaluating Confidence in Context for Context-Aware Security
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Marc Lacoste, Gilles Privat, Fano Ramparany
IEEEARES
2006
IEEE
15 years 3 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
NCA
2006
IEEE
15 years 3 months ago
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also ...
Leonardo B. Oliveira, Hao Chi Wong, Marshall W. Be...