Sciweavers

376 search results - page 71 / 76
» Teaching context in information security
Sort
View
DGO
2007
150views Education» more  DGO 2007»
13 years 9 months ago
Integration of text-based applications into service-oriented architectures for transnational digital government
Significant efforts are currently being pursued by several countries and IT providers to deploy SOA (Service Oriented Architecture) designs of digital government systems that inte...
Andréa M. Matsunaga, Maurício O. Tsu...
WIS
2004
13 years 9 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
SIGCSE
2008
ACM
111views Education» more  SIGCSE 2008»
13 years 7 months ago
Improving computer science diversity through summer camps
Summer camps offer a ripe opportunity for increasing computer science diversity. This panel provides several examples of summer camps that specifically recruit from traditionally ...
Dennis P. Groth, Helen H. Hu, Betty Lauer, Hwajung...
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
14 years 8 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 8 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar