Sciweavers

5665 search results - page 360 / 1133
» Introduction to Computer Security
Sort
View
121
Voted
IFIPTCS
2010
15 years 16 days ago
Safe Equivalences for Security Properties
Abstract. In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference)...
Mário S. Alvim, Miguel E. Andrés, Ca...
151
Voted
KSEM
2010
Springer
15 years 16 days ago
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Securi
Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In compar...
Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, ...
167
Voted
WOA
2010
15 years 14 days ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
GI
2009
Springer
15 years 12 days ago
Rao-Blackwellized Particle Filter for Security Surveillance
: Nowadays, the necessity of safeguarded environments is stronger than ever. The defence of public areas against terroristic threats requires intelligent security assistance system...
Felix Govaers, Monika Wieneke
116
Voted
AINA
2011
IEEE
14 years 6 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor