Sciweavers

2979 search results - page 308 / 596
» Modelling secure multiagent systems
Sort
View
JSW
2007
116views more  JSW 2007»
15 years 4 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
SOCIALCOM
2010
15 years 2 months ago
Securing Shareable Life-logs
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Reza Rawassizadeh, A Min Tjoa
ATAL
2005
Springer
15 years 10 months ago
A computationally grounded logic of knowledge, belief and certainty
This paper presents a logic of knowledge, belief and certainty, which allows us to explicitly express the knowledge, belief and certainty of an agent. A computationally grounded m...
Kaile Su, Abdul Sattar, Guido Governatori, Qinglia...
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 11 months ago
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
— An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communicati...
Yi Wang, Jiankun Hu
PCI
2005
Springer
15 years 10 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...