Sciweavers

1770 search results - page 251 / 354
» Writing requirements in computer security
Sort
View
ECIS
2000
13 years 11 months ago
Full Bindingness and Confidentiality
As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the co...
Arnd Weber
IEEESP
2008
136views more  IEEESP 2008»
13 years 10 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
13 years 10 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
SAC
2002
ACM
13 years 10 months ago
Agent factory: generative migration of mobile agents in heterogeneous environments
In most of today's agent systems migration of agents requires homogeneity in the programming language and/or agent platform in which an agent has been designed. In this paper...
Frances M. T. Brazier, Benno J. Overeinder, Maarte...
SOFTCOMP
2010
13 years 8 months ago
Approaching Real-Time Intrusion Detection through MOVICAB-IDS
Abstract This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time proces...
Martí Navarro, Álvaro Herrero, Emili...