Sciweavers

1970 search results - page 273 / 394
» Security Without Firewalls
Sort
View
CIC
2006
114views Communications» more  CIC 2006»
15 years 5 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
126
Voted
ECIS
2001
15 years 5 months ago
The Impact of Social Issues on Internet Policy Making
The advantages that Internet as a new technology offers to business and individuals can't be fully exploited without taking under consideration a number of social issues that...
Anastasia Papazafeiropoulou, Athanasia Pouloudi
DICTA
2003
15 years 5 months ago
Image Ownership Verification via Private Pattern and Watermarking Wavelet Filters
Abstract. In this paper, we propose a watermarking scheme for the image ownership verification in terms of a private key pattern and wavelet filters. The watermarking is mainly ach...
Zhuan Qing Huang, Zhuhan Jiang
113
Voted
LISA
2001
15 years 5 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
IIWAS
2003
15 years 5 months ago
The Effect of Information Seeking Behavior on an Online Purchase Intention
This paper reports a research in progress to study the effect of information seeking behavior on an online purchase intention. There are several strategies people use to find info...
Paulus Insap Santosa