Sciweavers

2454 search results - page 323 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ACMSE
2007
ACM
15 years 5 months ago
Honeypots: concepts, approaches, and challenges
Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the exi...
Iyatiti Mokube, Michele Adams
ELPUB
2007
ACM
15 years 5 months ago
Five Years on - The Impact of the Budapest Open Access Initiative
Open Access was first defined by the Budapest Open Access Initiative following a meeting organized by the Open Society Institute/Soros foundations. The subsequent Open Access move...
Melissa R. Hagemann
ICISS
2007
Springer
15 years 5 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
COOPIS
2004
IEEE
15 years 5 months ago
Classification and Analysis of Distributed Event Filtering Algorithms
Publish/subscribe middleware provides efficient support for loosely coupled communication in distributed systems. A number of different distributed message-filtering algorithms hav...
Sven Bittner, Annika Hinze
COOPIS
2004
IEEE
15 years 5 months ago
Active Replication in CORBA: Standards, Protocols, and Implementation Framework
This paper presents a proposal for integrating in a single CORBA middleware platform two important OMG specifications: FTCORBA, which provides fault-tolerance support for CORBA obj...
Alysson Neves Bessani, Joni da Silva Fraga, Lau Ch...