Sciweavers

1970 search results - page 329 / 394
» Security Without Firewalls
Sort
View
127
Voted
CERA
2004
89views more  CERA 2004»
15 years 3 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
148
Voted
JEI
2002
152views more  JEI 2002»
15 years 3 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
118
Voted
ICRA
2010
IEEE
154views Robotics» more  ICRA 2010»
15 years 2 months ago
Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator
— Soft robotic systems have applications in industrial, medical, and security applications. Many applications require these robots to be small and lightweight. One challenge in d...
Nadia Cheng, Genya Ishigami, Stephan Hawthorne, Ha...
152
Voted
KES
2008
Springer
15 years 2 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
110
Voted
MANSCI
2008
106views more  MANSCI 2008»
15 years 2 months ago
Can They Take It With Them? The Portability of Star Knowledge Workers' Performance
This paper examines the portability of star security analysts' performance. Star analysts who switched employers experienced an immediate decline in performance that persiste...
Boris Groysberg, Linda-Eling Lee, Ashish Nanda