Sciweavers

3349 search results - page 537 / 670
» Data Security
Sort
View
126
Voted
TIFS
2010
123views more  TIFS 2010»
15 years 1 months ago
A new framework for adaptive multimodal biometrics management
This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to ensure the optimal performance for the desired level of security. The adaptive c...
Ajay Kumar, Vivek Kanhangad, David Zhang
113
Voted
SOCIALCOM
2010
15 years 14 days ago
A Private and Reliable Recommendation System for Social Networks
Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
ICC
2009
IEEE
113views Communications» more  ICC 2009»
15 years 11 days ago
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic
When employing cryptographic tunnels such as the ones provided by Secure Shell (SSH) to protect their privacy on the Internet, users expect two forms of protection. First, they aim...
Maurizio Dusi, Alice Este, Francesco Gringoli, Luc...
131
Voted
IJNSEC
2010
98views more  IJNSEC 2010»
14 years 9 months ago
An MSS Based on the Elliptic Curve Cryptosystem
In 2004, a multi-signature scheme (MSS) based on the elliptic curve cryptosystem is given by Chen et al. [1]. Later, Liu and Liu [6] showed that if one of the users always sends h...
Hemlal Sahu, Birendra Kumar Sharma
122
Voted
JLP
2010
142views more  JLP 2010»
14 years 9 months ago
Relational bytecode correlations
We present a calculus for tracking equality relationships between values through pairs of bytecode programs. The calculus may serve as a certification mechanism for noninterferenc...
Lennart Beringer