Sciweavers

1154 search results - page 204 / 231
» Making Self-organizing Systems Secure
Sort
View
IMSA
2001
143views Multimedia» more  IMSA 2001»
14 years 11 months ago
A Collaborative Electronic Laboratory Notebook
We have developed a secure, collaborative, web-based electronic notebook (EN) designed to provide researchers and students with a means to record and share their primary research ...
James D. Myers, Elena S. Mendoza, B. Hoopes
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 9 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
66
Voted
JNW
2008
104views more  JNW 2008»
14 years 9 months ago
Fraudulent Internet Banking Payments Prevention using Dynamic Key
As the Internet becoming popular, many sectors such as banking and other financial institutions are adopting e-services and improving their Internet services. However, the e-servic...
Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srin...
IJIEM
2010
171views more  IJIEM 2010»
14 years 8 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
TIM
2011
172views more  TIM 2011»
14 years 4 months ago
Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
—High-resolution automated fingerprint recognition systems (AFRSs) offer higher security because they are able to make use of level-3 features, such as pores, that are not avail...
David Zhang, Feng Liu, Qijun Zhao, Guangming Lu, N...