Sciweavers

6555 search results - page 1096 / 1311
» Secure attribute-based systems
Sort
View
116
Voted
RAID
2005
Springer
15 years 9 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
127
Voted
TCC
2005
Springer
103views Cryptology» more  TCC 2005»
15 years 9 months ago
Fair-Zero Knowledge
Abstract. We introduce Fair Zero-Knowledge, a multi-verifier ZK system where every proof is guaranteed to be “zero-knowledge for all verifiers.” That is, if an honest verifi...
Matt Lepinski, Silvio Micali, Abhi Shelat
154
Voted
CASES
2004
ACM
15 years 9 months ago
A low power architecture for embedded perception
Recognizing speech, gestures, and visual features are important interface capabilities for future embedded mobile systems. Unfortunately, the real-time performance requirements of...
Binu K. Mathew, Al Davis, Michael Parker
130
Voted
ATAL
2004
Springer
15 years 9 months ago
Intelligent Agents Meet Semantic Web in a Smart Meeting Room
We describe a new smart meeting room system called EasyMeeting that explores the use of FIPA agent technologies, Semantic Web ontologies, logic reasoning, and security and privacy...
Harry Chen, Filip Perich, Dipanjan Chakraborty, Ti...
140
Voted
BPM
2004
Springer
114views Business» more  BPM 2004»
15 years 9 months ago
Modeling Medical E-services
On the one hand Web services are gaining increasing attention. A lot of standardization has improved their stability and range of application. Composition and coordination techniqu...
Rainer Anzböck, Schahram Dustdar
« Prev « First page 1096 / 1311 Last » Next »