Sciweavers

1564 search results - page 277 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
101
Voted
DATE
2010
IEEE
141views Hardware» more  DATE 2010»
15 years 5 months ago
An embedded platform for privacy-friendly road charging applications
—Systems based on satellite localization are enabling new scenarios for road charging schemes by offering the possibility to charge drivers as a function of their road usage. An ...
Josep Balasch, Ingrid Verbauwhede, Bart Preneel
DANCE
2002
IEEE
15 years 5 months ago
Active Network Vision and Reality: Lessons from a Capsule-Based System
Although active networks have generated much debate in the research community, on the whole there has been little hard evidence to inform this debate. This paper aims to redress t...
David Wetherall
NOMS
2002
IEEE
131views Communications» more  NOMS 2002»
15 years 5 months ago
Tools for domain-based policy management of distributed systems
The management of policies in large-scale systems is complex because of the potentially large number of policies and administrators, as well as the diverse types of information th...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
102
Voted
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 5 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
106
Voted
CRYPTO
1998
Springer
105views Cryptology» more  CRYPTO 1998»
15 years 4 months ago
An Efficient Discrete Log Pseudo Random Generator
The exponentiation function in a finite field of order p (a prime number) is believed to be a one-way function. It is well known that O(log log p) bits are simultaneously hard for ...
Sarvar Patel, Ganapathy S. Sundaram