Sciweavers

590 search results - page 70 / 118
» Security Issues in VOIP Applications
Sort
View
EUROPKI
2004
Springer
14 years 1 months ago
The EuroPKI Experience
Abstract. This paper discusses the technical and management experience gained in the day-by-day operation of the EuroPKI infrastructure. First the context where EuroPKI was born is...
Antonio Lioy, Marius Marian, Natalia Moltchanova, ...
ATAL
2003
Springer
14 years 1 months ago
An incentive compatible reputation mechanism
Traditional centralised approaches to security are difficult to apply to large, distributed marketplaces in which software agents operate. Developing a notion of trust that is ba...
Radu Jurca, Boi Faltings
ACSAC
2000
IEEE
14 years 11 days ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford
ATC
2006
Springer
13 years 10 months ago
Managing Trust in Distributed Agent Systems
Abstract. Software agent technology has attracted much attention for developing various distributed systems, composed of autonomous agents interacting with one another using partic...
Stephen S. Yau
DIMEA
2008
137views Multimedia» more  DIMEA 2008»
13 years 9 months ago
Biometric tendency recognition and classification system: an artistic approach
The Biometric Tendency Recognition and Classification System is a software application that continuously measures a participant's physiological responses to a given image and...
Carlos Castellanos, Philippe Pasquier, Luther Thie...