Sciweavers

2270 search results - page 405 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
140
Voted
GMP
2003
IEEE
247views Solid Modeling» more  GMP 2003»
15 years 9 months ago
Message Recovery Signature Scheme Using Complementary Elliptic Curves
Elliptic curve cryptography is known for its complexity due to its discrete logarithm problem, and this gives advantage to the system used since the formula developed using this c...
Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari
109
Voted
COMPSAC
2002
IEEE
15 years 8 months ago
Trust Services: A Framework for Service-Based Solutions
It is well understood that using a software component methodology can simplify the development and maintenance of systems. Web services allow this vision to be extended allowing c...
Adrian Baldwin, Simon Shiu, Marco Casassa Mont
132
Voted
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 7 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
115
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 3 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
131
Voted
TIFS
2010
123views more  TIFS 2010»
15 years 2 months ago
A new framework for adaptive multimodal biometrics management
This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to ensure the optimal performance for the desired level of security. The adaptive c...
Ajay Kumar, Vivek Kanhangad, David Zhang