Sciweavers

3638 search results - page 123 / 728
» Distribution chain security
Sort
View
90
Voted
EDOC
2006
IEEE
15 years 8 months ago
Information Security Guidance for Enterprise Transformation
John A. Anderson, Vijaykumar Rachamadugu
83
Voted
HOTI
2005
IEEE
15 years 8 months ago
Internet Infrastructure Security
G. Manimaran, Basheer Al-Duwairi
GCC
2004
Springer
15 years 8 months ago
Security Architecture for Web Services
Yuan Rao, Boqin Feng, Jincang Han
132
Voted
TRUSTBUS
2005
Springer
15 years 8 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
135
Voted
CCS
2009
ACM
15 years 6 months ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis