Sciweavers

6555 search results - page 1101 / 1311
» Secure attribute-based systems
Sort
View
163
Voted
CRYPTO
1992
Springer
181views Cryptology» more  CRYPTO 1992»
15 years 7 months ago
Fair Public-Key Cryptosystems
Abstract Joseph Kilian NEC Research Princeton, NJ 08540 Tom Leighton Mathematics Department Laboratory for Computer Science MIT Cambridge, MA 02139 August 17, 1994 Fair" Publ...
Silvio Micali
121
Voted
CAISE
2009
Springer
15 years 7 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
DIM
2007
ACM
15 years 7 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
EUC
2007
Springer
15 years 7 months ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
127
Voted
EXPCS
2007
15 years 7 months ago
Experimental economics and experimental computer science: a survey
In surprisingly many computer science research projects, system outcomes may be influenced by computerized or human agents with different economic incentives. Such studies include...
Jens Grossklags
« Prev « First page 1101 / 1311 Last » Next »