Sciweavers

3077 search results - page 58 / 616
» Research issues
Sort
View
IJNSEC
2006
143views more  IJNSEC 2006»
13 years 10 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
DEBU
2007
141views more  DEBU 2007»
13 years 10 months ago
Issues in Building Practical Provenance Systems
The importance of maintaining provenance has been widely recognized, particularly with respect to highly-manipulated data. However, there are few deployed databases that provide p...
Adriane Chapman, H. V. Jagadish
IJNSEC
2007
161views more  IJNSEC 2007»
13 years 9 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
WICOMM
2002
121views more  WICOMM 2002»
13 years 9 months ago
Open issues on TCP for mobile computing
We discuss the design principles of TCP within the context of heterogeneous wired/wireless networks and mobile networking. We identify three shortcomings in TCP's behavior: (...
Vassilios Tsaoussidis, Ibrahim Matta
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 7 months ago
Computerized adaptive testing: implementation issues
Abstract. One of the fastest evolving field among teaching and learning research is students' performance evaluation. Computer based testing systems are increasingly adopted b...
Margit Antal, Levente Erös, Attila Imre