Sciweavers

418 search results - page 2 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
IJNSEC
2010
152views more  IJNSEC 2010»
13 years 1 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
ESWA
2007
127views more  ESWA 2007»
13 years 6 months ago
An anticipation model of potential customers' purchasing behavior based on clustering analysis and association rules analysis
This paper proposes an anticipation model of potential customers’ purchasing behavior. This model is inferred from past purchasing behavior of loyal customers and the web server...
Horng-Jinh Chang, Lun-Ping Hung, Chia-Ling Ho
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 17 days ago
A Secure Authentication Policy for UMTS and WLAN Interworking
—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
Yen-Chieh Ouyang, Chang-Bu Jang, Hung-Ta Chen
ICPR
2008
IEEE
14 years 7 months ago
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics
Cancelable biometric systems are gaining in popularity for use in person authentication for applications where the privacy and security of biometric templates are important consid...
Achint Oommen Thomas, Nalini K. Ratha, Jonathan H....
SIN
2010
ACM
13 years 4 months ago
Analysis of privacy in online social networks of runet
In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situation...
Slava Kisilevich, Florian Mansmann