Sciweavers

1970 search results - page 273 / 394
» Security Without Firewalls
Sort
View
CIC
2006
114views Communications» more  CIC 2006»
13 years 11 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
ECIS
2001
13 years 11 months ago
The Impact of Social Issues on Internet Policy Making
The advantages that Internet as a new technology offers to business and individuals can't be fully exploited without taking under consideration a number of social issues that...
Anastasia Papazafeiropoulou, Athanasia Pouloudi
DICTA
2003
13 years 11 months ago
Image Ownership Verification via Private Pattern and Watermarking Wavelet Filters
Abstract. In this paper, we propose a watermarking scheme for the image ownership verification in terms of a private key pattern and wavelet filters. The watermarking is mainly ach...
Zhuan Qing Huang, Zhuhan Jiang
LISA
2001
13 years 11 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
IIWAS
2003
13 years 11 months ago
The Effect of Information Seeking Behavior on an Online Purchase Intention
This paper reports a research in progress to study the effect of information seeking behavior on an online purchase intention. There are several strategies people use to find info...
Paulus Insap Santosa