Sciweavers

1281 search results - page 4 / 257
» BASIS: A Biological Approach to System Information Security
Sort
View
SOCIALCOM
2010
13 years 5 months ago
Securing Shareable Life-logs
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Reza Rawassizadeh, A Min Tjoa
WSC
1998
13 years 8 months ago
Informational Macrodynamics: System Modelling and Simulation Methodologies
Informational Macrodynamics (IMD) presents a unified informational systemic approach with common information language for modeling, analysis and optimization of a variety of inter...
Vladimir S. Lerner
SECURWARE
2007
IEEE
14 years 1 months ago
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
WSCG
2000
84views more  WSCG 2000»
13 years 8 months ago
New Theory of Pattern Recognition on the Basis of Stochastic Geometry
The article offers a new approach towards the construction of recognition features independent of images' displacement or linear deformation. The distinguishing characteristi...
Nikolay G. Fedotov, Luydmila A. Shulga
ISDA
2006
IEEE
14 years 1 months ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu