Sciweavers

69 search results - page 9 / 14
» A Fuzzy Model for IT Security Investments
Sort
View
TCC
2005
Springer
116views Cryptology» more  TCC 2005»
14 years 3 months ago
Error Correction in the Bounded Storage Model
We initiate a study of Maurer’s bounded storage model (JoC, 1992) in presence of transmission errors and perhaps other types of errors that cause different parties to have incon...
Yan Zong Ding
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
14 years 4 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
FSS
2002
84views more  FSS 2002»
13 years 9 months ago
A possibilistic approach to selecting portfolios with highest utility score
The mean-variance methodology for the portfolio selection problem, originally proposed by Markowitz, has been one of the most important research fields in modern finance. In this ...
Christer Carlsson, Robert Fullér, Pé...
CCS
2007
ACM
14 years 4 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
CSREASAM
2006
13 years 11 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam