Sciweavers

14824 search results - page 2598 / 2965
» Security - Introduction
Sort
View
104
Voted
VIZSEC
2005
Springer
15 years 9 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
110
Voted
VLDB
2005
ACM
151views Database» more  VLDB 2005»
15 years 9 months ago
Query Execution Assurance for Outsourced Databases
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a...
Radu Sion
127
Voted
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 9 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
156
Voted
AVBPA
2005
Springer
271views Biometrics» more  AVBPA 2005»
15 years 9 months ago
Dynamic Approach for Face Recognition Using Digital Image Skin Correlation
With the recent emphasis on homeland security, there is an increased interest in accurate and non-invasive techniques for face recognition. Most of the current techniques perform a...
Satprem Pamudurthy, E. Guan, Klaus Mueller, Miriam...
127
Voted
ICCSA
2005
Springer
15 years 9 months ago
Mobile Mini-payment Scheme Using SMS-Credit
Mobile Phone has been widely used in the world and adopted in different application areas involved with SMS has been evolved for downloading logo, ring-tones, advertisement, secur...
Simon Fong, Edison Lai
« Prev « First page 2598 / 2965 Last » Next »