Sciweavers

3638 search results - page 645 / 728
» Distribution chain security
Sort
View
USENIX
1994
15 years 3 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
DSD
2010
IEEE
190views Hardware» more  DSD 2010»
15 years 2 months ago
Hardware-Based Speed Up of Face Recognition Towards Real-Time Performance
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...
I. Sajid, Sotirios G. Ziavras, M. M. Ahmed
SIGCOMM
2010
ACM
15 years 2 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
IOR
2006
192views more  IOR 2006»
15 years 2 months ago
Exact Simulation of Stochastic Volatility and Other Affine Jump Diffusion Processes
The stochastic differential equations for affine jump diffusion models do not yield exact solutions that can be directly simulated. Discretization methods can be used for simulati...
Mark Broadie, Özgür Kaya
ISI
2006
Springer
15 years 2 months ago
Tracing the Event Evolution of Terror Attacks from On-Line News
Since the September 11th terror attack at New York in 2001, the frequency of terror attacks around the world has been increasing and it draws more attention of the public. On Janua...
Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei