Sciweavers

367 search results - page 61 / 74
» Security Design in Online Games
Sort
View
FC
2007
Springer
106views Cryptology» more  FC 2007»
14 years 2 months ago
Dynamic Virtual Credit Card Numbers
Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credi...
Ian Molloy, Jiangtao Li, Ninghui Li
SWS
2006
ACM
14 years 1 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
FLAIRS
2003
13 years 9 months ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter
JETAI
2007
141views more  JETAI 2007»
13 years 7 months ago
Exchange market for complex commodities: search for optimal matches
The Internet has led to the development of on-line markets, and computer scientists have designed various auction algorithms, as well as automated exchanges for standardized commo...
Eugene Fink, Jianli Gong, Josh Johnson
ISI
2008
Springer
13 years 8 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham