Sciweavers

1627 search results - page 152 / 326
» High Security Smartcards
Sort
View
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
15 years 8 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
ISF
2008
114views more  ISF 2008»
15 years 4 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
INFOCOM
2008
IEEE
15 years 11 months ago
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System
Abstract—Today vehicle theft rate is very high, thus tracking/alarming systems are being deployed with an increasingly popularity. These systems however bear some limitations suc...
Hui Song, Sencun Zhu, Guohong Cao
ICDCS
2008
IEEE
15 years 11 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 11 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...