Sciweavers

1970 search results - page 329 / 394
» Security Without Firewalls
Sort
View
CERA
2004
89views more  CERA 2004»
13 years 7 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
JEI
2002
152views more  JEI 2002»
13 years 7 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
ICRA
2010
IEEE
154views Robotics» more  ICRA 2010»
13 years 6 months ago
Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator
— Soft robotic systems have applications in industrial, medical, and security applications. Many applications require these robots to be small and lightweight. One challenge in d...
Nadia Cheng, Genya Ishigami, Stephan Hawthorne, Ha...
KES
2008
Springer
13 years 6 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
MANSCI
2008
106views more  MANSCI 2008»
13 years 6 months ago
Can They Take It With Them? The Portability of Star Knowledge Workers' Performance
This paper examines the portability of star security analysts' performance. Star analysts who switched employers experienced an immediate decline in performance that persiste...
Boris Groysberg, Linda-Eling Lee, Ashish Nanda