Sciweavers

3544 search results - page 584 / 709
» Information Security in Open Systems
Sort
View
BMCBI
2005
87views more  BMCBI 2005»
14 years 11 months ago
BioCreAtIvE Task 1A: gene mention finding evaluation
Background: The biological research literature is a major repository of knowledge. As the amount of literature increases, it will get harder to find the information of interest on...
Alexander S. Yeh, Alexander A. Morgan, Marc E. Col...
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 2 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 4 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
HPCA
2009
IEEE
15 years 11 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger