Sciweavers

1186 search results - page 14 / 238
» A New Approach to Secure Logging
Sort
View
SAC
2011
ACM
12 years 11 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
12 years 4 months ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
ICIAP
2001
Springer
14 years 8 months ago
Eigenspace-Based Recognition of Faces: Comparisons and a New Approach
Different eigenspace-based approaches have been proposed for the recognition of faces. They differ mostly in the kind of projection method been used and in the similarity matching ...
Pablo Navarrete, Javier Ruiz-del-Solar
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 8 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...
JCS
2011
156views more  JCS 2011»
13 years 3 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran