Sciweavers

2270 search results - page 23 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
MTA
2008
134views more  MTA 2008»
13 years 8 months ago
A survey of content based 3D shape retrieval methods
Recent developments in techniques for modeling, digitizing and visualizing 3D shapes has led to an explosion in the number of available 3D models on the Internet and in domain-spe...
Johan W. H. Tangelder, Remco C. Veltkamp
AFRICACRYPT
2008
Springer
14 years 3 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
AISM
2004
13 years 10 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
NC
2010
137views Neural Networks» more  NC 2010»
13 years 3 months ago
On the regularity of circular splicing languages: a survey and new developments
Circular splicing has been introduced to model a specific recombinant behaviour of circular DNA, continuing the investigation initiated with linear splicing. In this paper we focu...
Paola Bonizzoni, Clelia de Felice, Gabriele Fici, ...
CIS
2006
Springer
14 years 10 days ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar