Sciweavers

1663 search results - page 74 / 333
» Computer Security in the Real World
Sort
View
ECUMN
2007
Springer
14 years 3 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
DSD
2010
IEEE
190views Hardware» more  DSD 2010»
13 years 9 months ago
Hardware-Based Speed Up of Face Recognition Towards Real-Time Performance
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...
I. Sajid, Sotirios G. Ziavras, M. M. Ahmed
SOFTCOMP
2010
13 years 7 months ago
Approaching Real-Time Intrusion Detection through MOVICAB-IDS
Abstract This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time proces...
Martí Navarro, Álvaro Herrero, Emili...
HUC
2005
Springer
14 years 2 months ago
Scanning Objects in the Wild: Assessing an Object Triggered Information System
We describe the results of a field deployment of the AURA system which links online content to physical objects through machine readable tags. AURA runs on commercially available p...
A. J. Bernheim Brush, Tammara Combs Turner, Marc A...
ICCHP
2004
Springer
14 years 2 months ago
proXimity: Ad-Hoc Networks for Enhanced Mobility
David tries not to use unfamiliar trains and buses, he doesn’t travel to places he doesn’t know, and he doesn’t travel in unusual environments without a companion. David is v...
Simon Harper, Stephen Pettitt, Carole A. Goble