Sciweavers

2601 search results - page 11 / 521
» Secure Rewarding Schemes
Sort
View
ACISP
1998
Springer
13 years 11 months ago
On Private-Key Cryptosystems Based on Product Codes
Recently J. and R.M. Campello de Souza proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In...
Hung-Min Sun, Shiuh-Pyng Shieh
ISF
2007
104views more  ISF 2007»
13 years 7 months ago
Overcoming organizational challenges to secure knowledge management
—Successful secure knowledge management requires consideration of both technical and organizational concerns. We use the example of existing industrial incident management system...
Finn Olav Sveen, Eliot Rich, Matthew Jager
CORR
2008
Springer
187views Education» more  CORR 2008»
13 years 7 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 1 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
TSMC
2002
102views more  TSMC 2002»
13 years 7 months ago
Generalized pursuit learning schemes: new families of continuous and discretized learning automata
The fastest learning automata (LA) algorithms currently available fall in the family of estimator algorithms introduced by Thathachar and Sastry [24]. The pioneering work of these ...
M. Agache, B. John Oommen