Sciweavers

3086 search results - page 524 / 618
» Developing Secure Web Applications
Sort
View
ICISC
2004
112views Cryptology» more  ICISC 2004»
13 years 10 months ago
Improvement on Ha-Moon Randomized Exponentiation Algorithm
Randomized recoding on the exponent of an exponentiation computation into a signed-digit representation has been a well known countermeasure against some side-channel attacks. Howe...
Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, Jae...
CSDA
2008
147views more  CSDA 2008»
13 years 9 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
IJNSEC
2006
82views more  IJNSEC 2006»
13 years 9 months ago
A Study of Micro-payment Based on One-way Hash Chain
Electronic payment systems have gradually become an important issue nowadays because of the popularity and importance of electronic commerce on the Internet. Security and convenie...
Min-Shiang Hwang, Pei-Chen Sung
MTA
2008
93views more  MTA 2008»
13 years 9 months ago
Digital audiobook: from passive to active pursuit
The digital home entertainment market is growing at an exceptional speed and, although limited to passive listeners, audiobook applications are growing at an annual rate of nearly ...
Marco Furini
IJIPT
2007
91views more  IJIPT 2007»
13 years 9 months ago
Multi-tag RFID systems
: Successful object identification is the primary objective of radio frequency identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detec...
Leonid Bolotnyy, Gabriel Robins