Sciweavers

1627 search results - page 145 / 326
» High Security Smartcards
Sort
View
CIS
2004
Springer
15 years 10 months ago
A Scalable and Reliable Mobile Agent Computation Model
This paper presents a high performance service based mobile agent computation model. The scalability and reliability of this model is secured through the service clone policy and a...
Yong Liu, Congfu Xu, Zhaohui Wu, Yunhe Pan
ECEH
2006
144views Healthcare» more  ECEH 2006»
15 years 6 months ago
Process Based Data Logistics: Data Integration for Healthcare Applications
Data integration in medical applications is a crucial and sensitive task. It turns out that there are rigid factors like heterogeneous, distributed data sources, security, and comp...
Stefan Jablonski
195
Voted
BIOSIG
2009
136views Biometrics» more  BIOSIG 2009»
15 years 2 months ago
Tamper-proof and Privacy-protected Fingerprint Identification Systems
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
Michael Schwaiger
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 5 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
IDTRUST
2009
ACM
15 years 11 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol