Sciweavers

1282 search results - page 216 / 257
» Signing on signing off
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 9 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
AMC
2005
138views more  AMC 2005»
13 years 9 months ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
ALIFE
2004
13 years 9 months ago
Development and the Baldwin Effect
Baldwin's classic hypothesis states that behavioral plasticity can speed evolution by (a) smoothing the fitness landscape and (b) indirect genetic assimilation of acquired cha...
Keith L. Downing
COMPSEC
2004
95views more  COMPSEC 2004»
13 years 9 months ago
Cumulative notarization for long-term preservation of digital signatures
The long-term preservation of digitally signed documents may be approached and analyzed from various perspectives, i.e. future data readability, signature validity, storage media ...
Dimitrios Lekkas, Dimitris Gritzalis
CONNECTION
2004
94views more  CONNECTION 2004»
13 years 9 months ago
Evolving internal memory for T-maze tasks in noisy environments
In autonomous agent systems, internal memory can be an important element to overcome the limitations of purely reactive agent behaviour. This paper presents an analysis of memory r...
DaeEun Kim