Sciweavers

2207 search results - page 55 / 442
» Security at the Internet Layer
Sort
View
131
Voted
ECIS
2000
15 years 5 months ago
Using EMV Smartcards for Internet Payments
Abstract--Existing smartcards developed for point-ofsale payments are being considered for use in Internet transactions. Such use provides an alternative to designing new smartcard...
Els van Herreweghen, Uta Wille
175
Voted
PDCAT
2009
Springer
15 years 10 months ago
Bifrost : A Novel Anonymous Communication System with DHT
An immense amount of information is processed on the Internet due to its spread, increasing the severity of such problems as the disclosure of personal information; privacy protec...
Masaki Kondo, Shoichi Saito, Kiyohisa Ishiguro, Hi...
KDD
1995
ACM
139views Data Mining» more  KDD 1995»
15 years 7 months ago
Resource and Knowledge Discovery in Global Information Systems: A Preliminary Design and Experiment
Eficient and efiective discovery of resource and knowledge from the Internet has become an imminent research issue, especially with the advent of the Information Super-Highway. A ...
Osmar R. Zaïane, Jiawei Han
COMSUR
2000
202views more  COMSUR 2000»
15 years 3 months ago
A Survey of Trust in Internet Applications
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy i.e. who is authorised to perform action...
Tyrone Grandison, Morris Sloman
130
Voted
USITS
2003
15 years 5 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen