Sciweavers

2846 search results - page 73 / 570
» Not one click for security
Sort
View
COMPSEC
2006
143views more  COMPSEC 2006»
15 years 4 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
INFOCOM
2010
IEEE
15 years 2 months ago
Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams
—Linear network coding is a promising technology that can maximize the throughput capacity of communication network. Despite this salient feature, there are still many challenges...
Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naiji...
164
Voted
JDCTA
2010
125views more  JDCTA 2010»
14 years 11 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
IACR
2011
223views more  IACR 2011»
14 years 3 months ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...
PVLDB
2008
163views more  PVLDB 2008»
15 years 3 months ago
C-DEM: a multi-modal query system for Drosophila Embryo databases
The amount of biological data publicly available has experienced an exponential growth as the technology advances. Online databases are now playing an important role as informatio...
Fan Guo, Lei Li, Christos Faloutsos, Eric P. Xing