Sciweavers

591 search results - page 31 / 119
» Securing the Broker Pattern
Sort
View
EUC
2005
Springer
14 years 2 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
MHCI
2009
Springer
14 years 3 months ago
Detecting physical shock by a mobile phone and its applications in security and emergency
In this paper, we propose a method for detecting physical shock by a mobile phone and its applications in security and emergency scenarios. We use acceleration signal provided by ...
Hamed Ketabdar
SECURWARE
2008
IEEE
14 years 3 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
MCS
2004
Springer
14 years 2 months ago
High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers
Recent works about perceptron-based fusion of multiple fingerprint matchers showed the effectiveness of such approach in improving the performance of personal identity verification...
Gian Luca Marcialis, Fabio Roli
MCS
2011
Springer
13 years 3 months ago
Social security and divorce in Japan
: The purpose of this paper is to explain variations in the divorce rates across prefectures in Japan over the period 1982 to 2002. This paper examines the various factors which ma...
Kei Sakata, Colin R. McKenzie