Sciweavers

14824 search results - page 2717 / 2965
» Security - Introduction
Sort
View
CORR
2008
Springer
111views Education» more  CORR 2008»
15 years 3 months ago
XML Rewriting Attacks: Existing Solutions and their Limitations
Web Services are web-based applications made available for web users or remote Web-based programs. In order to promote interoperability, they publish their interfaces in the so-ca...
Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet
CSDA
2008
147views more  CSDA 2008»
15 years 3 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
AAECC
2006
Springer
125views Algorithms» more  AAECC 2006»
15 years 3 months ago
Combinatorial Group Theory and Public Key Cryptography
Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that th...
Vladimir Shpilrain, Gabriel Zapata
ADHOC
2006
95views more  ADHOC 2006»
15 years 3 months ago
LHAP: A lightweight network access control protocol for ad hoc networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
ECRA
2008
121views more  ECRA 2008»
15 years 3 months ago
Past, present and future of mobile payments research: A literature review
The mobile payment services markets are currently under transition with a history of numerous tried and failed solutions, and a future of promising but yet uncertain possibilities...
Tomi Dahlberg, Niina Mallat, Jan Ondrus, Agnieszka...
« Prev « First page 2717 / 2965 Last » Next »