Sciweavers

2081 search results - page 358 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 2 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen
WEBI
2009
Springer
14 years 2 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li
IFIP
2009
Springer
14 years 2 months ago
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielse...
GMP
2003
IEEE
247views Solid Modeling» more  GMP 2003»
14 years 1 months ago
Message Recovery Signature Scheme Using Complementary Elliptic Curves
Elliptic curve cryptography is known for its complexity due to its discrete logarithm problem, and this gives advantage to the system used since the formula developed using this c...
Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari
FC
1998
Springer
134views Cryptology» more  FC 1998»
14 years 1 days ago
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash
In this paper we construct a practical group blind signature scheme. Our scheme combines the already existing notions of blind signatures and group signatures. It is an extension o...
Anna Lysyanskaya, Zulfikar Ramzan