Sciweavers

211 search results - page 18 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
SAFECOMP
2007
Springer
14 years 1 months ago
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...
PDPTA
2000
13 years 8 months ago
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications
In this paper, a Shopping Information Agent System (SIAS) is built based on mobile agent technology. It sends out agents to di erent hosts in an electronic marketplace. The agents ...
Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wo...
ISI
2005
Springer
14 years 1 months ago
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall
Intelligence analysts are flooded with massive amounts of data from a multitude of sources and in many formats. From this raw data they attempt to gain insight that will provide de...
Gregory J. Conti, Mustaque Ahamad, Robert Norback
MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
14 years 1 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
APGV
2008
ACM
164views Visualization» more  APGV 2008»
13 years 9 months ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...