Sciweavers

1875 search results - page 267 / 375
» Modeling the Security of Steganographic Systems
Sort
View
104
Voted
SPW
2000
Springer
15 years 4 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
JETAI
2007
141views more  JETAI 2007»
15 years 10 days ago
Exchange market for complex commodities: search for optimal matches
The Internet has led to the development of on-line markets, and computer scientists have designed various auction algorithms, as well as automated exchanges for standardized commo...
Eugene Fink, Jianli Gong, Josh Johnson
136
Voted
IEEEARES
2006
IEEE
15 years 6 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ICPR
2002
IEEE
15 years 5 months ago
Real-Time Cooperative Multi-Target Tracking by Communicating Active Vision Agents
Abstract Target detection and tracking is one of the most important and fundamental technologies to develop real world computer vision systems such as security and traffic monitori...
Norimichi Ukita, Takashi Matsuyama
98
Voted
CCS
2001
ACM
15 years 5 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé