Sciweavers

15379 search results - page 210 / 3076
» Protecting users from
Sort
View
AINA
2005
IEEE
14 years 1 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho
ISW
2010
Springer
13 years 6 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
ACISICIS
2005
IEEE
14 years 1 months ago
Security Service Framework for Home Network
Home networking is the collection of elements that process, manage, transport, and store information, enabling the connection and integration of multiple computing, control, monit...
Zhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Ba...
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
13 years 6 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs
AMM
2011
118views more  AMM 2011»
13 years 3 months ago
From Community Detection to Mentor Selection in Rating-Free Collaborative Filtering
—The number of resources or items that users can now access when navigating on the Web or using e-services, is so huge that these might feel lost due to the presence of too much ...
Armelle Brun, Sylvain Castagnos, Anne Boyer