Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
CRT RSA algorithm protected against fault attacks
Boscher, Arnaud, Naciri, Robert, Prouff, Emmanuel
Published in Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems (09.05.2007)
Published in Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems (09.05.2007)
Get full text
Conference Proceeding
Usable Object Management approaches for online social networks
Cheek, Gorrell P., Shehab, Mohamed
Published in Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : ASONAM 2013 : Niagara Falls, Canada, August 25-28, 2013 (01.08.2013)
Published in Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : ASONAM 2013 : Niagara Falls, Canada, August 25-28, 2013 (01.08.2013)
Get full text
Conference Proceeding
A Trustworthiness Fusion Model for Service Cloud Platform Based on D-S Evidence Theory
Rong Hu, Jianxun Liu, Liu, X. F.
Published in 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (01.05.2011)
Published in 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (01.05.2011)
Get full text
Conference Proceeding
Boosting-Based Distributed and Adaptive Security-Monitoring through Agent Collaboration
Jean, Evens, Jiao, Yu, Hurson, Ali R., Potok, Thomas E.
Published in Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops (02.11.2007)
Published in Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops (02.11.2007)
Get full text
Conference Proceeding
Access Control with Uncertain Surveillance
Balbiani, Philippe
Published in IEEE/WIC/ACM International Conference on web intelligence (19.09.2005)
Published in IEEE/WIC/ACM International Conference on web intelligence (19.09.2005)
Get full text
Conference Proceeding
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
Foley, Simon, Gong, Li, Qian, Xiaolei
Published in Proceedings of the 1996 IEEE Symposium on Security and Privacy (06.05.1996)
Published in Proceedings of the 1996 IEEE Symposium on Security and Privacy (06.05.1996)
Get full text
Conference Proceeding