Sciweavers

2454 search results - page 221 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ITNG
2008
IEEE
15 years 8 months ago
Chord-Based Key Establishment Schemes for Sensor Networks
— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
Fan Zhang, Zhijie Jerry Shi, Bing Wang
AICT
2006
IEEE
116views Communications» more  AICT 2006»
15 years 7 months ago
Integrating AJAX Approach into GIS Visualization Web Services
As the Web platform continues to mature, we see an increasing number of amazing technologies that take Geographic Information Systems (GIS) visualization applications to new level...
Ahmet Sayar, Marlon E. Pierce, Geoffrey Fox
ICITA
2005
IEEE
15 years 7 months ago
Uncovering Attacks on Security Protocols
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Wuu Yang
ITNG
2010
IEEE
15 years 7 days ago
Scalable Intrusion Detection with Recurrent Neural Networks
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
120
Voted
HICSS
2007
IEEE
195views Biometrics» more  HICSS 2007»
15 years 8 months ago
Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study
A qualitative study was conducted to explore how subjects use social networking sites and instant messenger to engage in interpersonal relationships. The results were used to deve...
Catherine Dwyer