Sciweavers

3358 search results - page 589 / 672
» The Knowledge Grid Environment
Sort
View
EUC
2006
Springer
14 years 1 months ago
A Scalable and Untraceable Authentication Protocol for RFID
RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduce...
Youngjoon Seo, Hyunrok Lee, Kwangjo Kim
FC
2006
Springer
107views Cryptology» more  FC 2006»
14 years 1 months ago
Efficient Broadcast Encryption Scheme with Log-Key Storage
In this paper, we present a broadcast encryption scheme with efficient transmission cost under the log-key restriction. Given n users and r revoked users, our scheme has the trans...
Yong Ho Hwang, Pil Joong Lee
ACSAC
2001
IEEE
14 years 1 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
IEAAIE
2000
Springer
14 years 1 months ago
Information Management and Process Improvement Using Data Mining Techniques
This paper describes a computer component manufacturing scenario which concentrates on the application of data mining techniques to improve information management and process impr...
W. M. Gibbons, Mervi Ranta, T. M. Scott, Martti M&...
ITS
2000
Springer
128views Multimedia» more  ITS 2000»
14 years 1 months ago
Active Learner Modelling
Abstract. It is common to think of a "learner model" as a global description of a student's understanding of domain content. We propose a notion of learner model whe...
Gordon I. McCalla, Julita Vassileva, Jim E. Greer,...