Sciweavers

45 search results - page 7 / 9
» An Anonymous Credit Card System
Sort
View
HPCA
2008
IEEE
14 years 8 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
FMICS
2008
Springer
13 years 9 months ago
Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties
Given the intractability of exhaustively verifying software, the use of runtime-verification, to verify single execution paths at runtime, is becoming popular. Although the use of ...
Christian Colombo, Gordon J. Pace, Gerardo Schneid...
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
14 years 2 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
MOBILITY
2009
ACM
14 years 2 months ago
UbiPay: minimizing transaction costs with smart mobile payments
Implementing an electronic payment system involves striking a balance between usability and security. Systems that allow payments to be completed with little effort on the part of...
Vili Lehdonvirta, Hayuru Soma, Hitoshi Ito, Tetsuo...