Sciweavers

14824 search results - page 2540 / 2965
» Security - Introduction
Sort
View
GRID
2007
Springer
15 years 10 months ago
Dynamic, context-aware, least-privilege grid delegation
— Performing delegation in large scale, dynamic and distributed environments with large numbers of shared resources is more challenging than inside local administrative domains. ...
Mehran Ahsant, Jim Basney, S. Lennart Johnsson
HPCC
2007
Springer
15 years 10 months ago
Software Pipelining for Packet Filters
Packet filters play an essential role in traffic management and security management on the Internet. In order to create software-based packet filters that are fast enough to work...
Yoshiyuki Yamashita, Masato Tsuru
HUC
2007
Springer
15 years 10 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
ICB
2007
Springer
110views Biometrics» more  ICB 2007»
15 years 10 months ago
Comparison of Compression Algorithms' Impact on Iris Recognition Accuracy
The impact of using different lossy compression algorithms on the matching accuracy of iris recognition systems is investigated. In particular, we relate rate-distortion performan...
Stefan Matschitsch, Martin Tschinder, Andreas Uhl
ICICS
2007
Springer
15 years 10 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
« Prev « First page 2540 / 2965 Last » Next »