Sciweavers

859 search results - page 98 / 172
» Security for Key Management Interfaces
Sort
View
ISW
2009
Springer
14 years 4 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 10 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
APWEB
2007
Springer
14 years 4 months ago
Managing a Geographic Database from Mobile Devices Through OGC Web Services
We present in this paper a system for the management of geographic databases from mobile devices. The architecture of the system is extensible in the sense that it can be adapted t...
Nieves R. Brisaboa, Miguel Rodríguez Luaces...
IAAI
2001
13 years 11 months ago
CARMA: A Case-Based Range Management Advisor
: CARMA is an advisory system for rangeland grasshopper infestations that demonstrates how AI technology can deliver expert advice to compensate for cutbacks in public services. CA...
Karl Branting, John D. Hastings, Jeffrey A. Lockwo...
SASO
2007
IEEE
14 years 4 months ago
Towards Supporting Interactions between Self-Managed Cells
Management in pervasive systems cannot rely on human intervention or centralised decision-making functions. It must be devolved, based on local decision-making and feedback contro...
Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker...