Sciweavers

3544 search results - page 465 / 709
» Information Security in Open Systems
Sort
View
JNW
2008
104views more  JNW 2008»
14 years 11 months ago
Fraudulent Internet Banking Payments Prevention using Dynamic Key
As the Internet becoming popular, many sectors such as banking and other financial institutions are adopting e-services and improving their Internet services. However, the e-servic...
Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srin...
IJISEC
2007
87views more  IJISEC 2007»
14 years 11 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
COMCOM
2004
79views more  COMCOM 2004»
14 years 11 months ago
Anomaly detection methods in wired networks: a survey and taxonomy
Despite the advances reached along the last 20 years, anomaly detection in network behavior is still an immature technology, and the shortage of commercial tools thus corroborates...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
IEEEARES
2008
IEEE
15 years 6 months ago
A Lazy Monitoring Approach for Heartbeat-Style Failure Detectors
—Failure detectors are a fundamental part of safe fault-tolerant distributed systems. Many failure detectors use heartbeats to draw conclusions about the state of nodes within a ...
Benjamin Satzger, Andreas Pietzowski, Wolfgang Tru...
OOPSLA
1992
Springer
15 years 3 months ago
A Comparative Performance Evaluation of Write Barrier Implementations
Generational garbage collectors are able to achieve very small pause times by concentrating on the youngest (most recently allocated) objects when collecting, since objects have b...
Antony L. Hosking, J. Eliot B. Moss, Darko Stefano...