Sciweavers

6137 search results - page 1009 / 1228
» Securing Collaborative Applications
Sort
View
RAID
2010
Springer
15 years 19 days ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
SUTC
2010
IEEE
15 years 18 days ago
User-Based Attestation for Trustworthy Visual Sensor Networks
Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
Thomas Winkler, Bernhard Rinner
BMVC
2010
15 years 8 days ago
Object Recognition using 3D SIFT in Complex CT Volumes
The automatic detection of objects within complex volumetric imagery is becoming of increased interest due to the use of dual energy Computed Tomography (CT) scanners as an aviati...
Gregory T. Flitton, Toby P. Breckon, Najla Megherb...
CANS
2010
Springer
146views Cryptology» more  CANS 2010»
15 years 8 days ago
Anonymous Credential Schemes with Encrypted Attributes
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully di...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
DATESO
2010
150views Database» more  DATESO 2010»
15 years 7 days ago
Evolving Quasigroups by Genetic Algorithms
Abstract. Quasigroups are a well-known combinatorial design equivalent to more familiar Latin squares. Because all possible elements of a quasigroup occur with equal probability, i...
Václav Snásel, Jiri Dvorský, ...
« Prev « First page 1009 / 1228 Last » Next »