Search

Showing total 1,121 results
1,121 results

Search Results

1. On the Use of Different Statistical Tests for Alert Correlation - Short Paper.

2. From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust.

3. Improving Mobile Solution Workflows and Usability Using Near Field Communication Technology.

4. A Study of Detection Method of Printed Image Alteration Using Digital Watermark.

5. Secure Quantization Index Modulation Watermark Detection.

6. On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance.

7. Well-Being Store: A New Channel in U-Commerce for Insurance Industry.

8. Minimal Threshold Closure.

9. Cloak: A Ten-Fold Way for Reliable Covert Communications.

10. Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack.

11. Click Passwords Under Investigation.

12. Information Confinement, Privacy, and Security in RFID Systems.

13. Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.

14. Situated Public News and Reminder Displays.

15. Active Coordination Artifacts in Collaborative Ubiquitous-Computing Environments.

16. Experiments on the Linear Algebra Step in the Number Field Sieve.

17. A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.

18. Resolving the Semantic Inconsistency Problem for Ubiquitous RFID Applications.

19. Augmented Video Services and Its Applications in an Advanced Access Grid Environment.

20. Personalized u-Portal System with Ontology and Web Services.

21. A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home.

22. A Novel Steganographic Technique Based on Image Morphing.

23. Joint Power Control and Channel Assignment Algorithms for Wireless Ad Hoc Networks.

24. Intelligent Pervasive Middleware Based on Biometrics.

25. A Smart Identification Card System Using Facial Biometric: From Architecture to Application.

26. Design and Implementation of a Smart Tag System for IT-Based Port Logistics.

27. A Flexible Display by Integrating a Wall-Size Display and Steerable Projectors.

28. Doing Community: Co-construction of Meaning and Use with Interactive Information Kiosks.

29. No More SMS from Jesus: Ubicomp, Religion and Techno-spiritual Practices.

30. Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy.

31. A Framework for Exploiting Security Expertise in Application Development.

32. Towards Scalable Management of Privacy Obligations in Enterprises.

33. Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.

34. Pseudonymity in the Light of Evidence-Based Trust.

35. BLIND: A Complete Identity Protection Framework for End-Points.

36. Toward a Broader View of Security Protocols (Transcript of Discussion).

37. Limits to Anonymity When Using Credentials.

38. Cheating Immune (2,n)-Threshold Visual Secret Sharing.

39. On the Higher Order Nonlinearities of Algebraic Immune Functions.

40. Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots.

41. DECA: A Hierarchical Framework for DECentralized Aggregation in DHTs.

42. A Chaos-Based Robust Software Watermarking.

43. Practical Forensic Analysis in Advanced Access Content System.

44. A Design and Implementation of Profile Based Web Application Securing Proxy.

45. Using π-Calculus to Formalize Domain Administration of RBAC.

46. Preventing Web-Spoofing with Automatic Detecting Security Indicator.

47. Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication.

48. Further Security Analysis of XTR.

49. Applying a Security Requirements Engineering Process.

50. Case Study of a Fault Attack on Asynchronous DES Crypto-Processors.