Sciweavers

2904 search results - page 192 / 581
» Internet Infrastructure Security
Sort
View
ICWS
2007
IEEE
15 years 5 months ago
A Model to support SPKI Federations management through XKMS
The purpose of the XML Key Management Specification (XKMS) is to facilitate the use of a Public Key Infrastructure (PKI) by transferring the complexity associated with PKI to a t...
Michelle S. Wangham, Emerson Ribeiro de Mello, Jon...
ICWS
2010
IEEE
15 years 2 months ago
jGASW: A Service-Oriented Framework Supporting HTC and Non-functional Concerns
—Although Service-Oriented principles have been widely adopted by High Throughput Computing infrastructure designers, the integration between SOA and HTC is made difficult by le...
Javier Rojas Balderrama, Johan Montagnat, Diane Li...
153
Voted
ARTCOM
2009
IEEE
15 years 9 months ago
Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication
Nowadays, the transmission of digitized medical information has become very convenient due to the generality of Internet. Internet has created the biggest benefit to achieve the tr...
P. Viswanathan, P. Venkata Krishna
UIST
2004
ACM
15 years 9 months ago
A gesture-based authentication scheme for untrusted public terminals
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This...
Shwetak N. Patel, Jeffrey S. Pierce, Gregory D. Ab...
152
Voted
MATA
2004
Springer
189views Communications» more  MATA 2004»
15 years 9 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...