Sciweavers

257 search results - page 47 / 52
» Delegating network security with more information
Sort
View
IJVR
2008
118views more  IJVR 2008»
13 years 7 months ago
Use of Technology Enhanced Education to Improve Teaching and Learning Process
The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 5 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...
IEEESP
2011
12 years 10 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 1 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
AFRICACRYPT
2010
Springer
14 years 1 months ago
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communica...
Michel Abdalla, Céline Chevalier, Mark Manu...