Sciweavers

6555 search results - page 1081 / 1311
» Secure attribute-based systems
Sort
View
132
Voted
IEEEHPCS
2010
14 years 10 months ago
Framework of Web content filtering for IPv6
IPv6 embraces various good features from the security perspective, but the improvements also bring us some new challenges for web content filtering. This paper presents a new fram...
Yingxu Lai, Qian Ma, Zhen Yang, Jing Liu
140
Voted
IJNSEC
2010
98views more  IJNSEC 2010»
14 years 10 months ago
An MSS Based on the Elliptic Curve Cryptosystem
In 2004, a multi-signature scheme (MSS) based on the elliptic curve cryptosystem is given by Chen et al. [1]. Later, Liu and Liu [6] showed that if one of the users always sends h...
Hemlal Sahu, Birendra Kumar Sharma
173
Voted
JDCTA
2010
250views more  JDCTA 2010»
14 years 10 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
ICASSP
2011
IEEE
14 years 7 months ago
Efficiently computing private recommendations
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused ...
Zekeriya Erkin, M. Beye, T. Veugen, Reginald L. La...
160
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...
« Prev « First page 1081 / 1311 Last » Next »