This is TikiWiki v1.9.8.3 -Sirius- © 2002–2007 by the Tiki community Sat 21 of Dec, 2024 [17:43 UTC]
Menu

Category K.6.5 Security and Protection

Authentication Insurance Invasive software (e.g., viruses, worms, Trojan horses) Physical security Unauthorized access (e.g., hacking, phreaking)
Browse in:
All Wiki pages Image galleries Images File galleries Blogs Trackers Items Surveys Articles

search category: deep:

Hide subcategories objects

..
 

Objects (4)

K.6.5 Security and ProtectionArticle AGENT-BASED ANOMALIES MONITORING IN DISTRIBUTED SYSTEMS Abstract. In this paper an agent-based approach for anomalies monitoring in distributed systems such as computer networks, or Grid systems is proposed. This approach envisages on-line and off-line mo 
K.6.5 Security and ProtectionArticle CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS Abstract: In this paper, a methodology for reliable password generation from fingerprints is developed. In contrast to traditional biometric systems, proposed algorithm does not authenticate user by  
K.6.5 Security and ProtectionArticle DIGITAL ARCHIVE AND MULTIMEDIA LIBRARY FOR BULGARIAN TRADITIONAL CULTURE ... Abstract: In this paper we present investigation of methods and techniques for digitization and security in digital folklore archive - an archive that consists of unique folklore artifacts stored and 
K.6.5 Security and ProtectionArticle PROTECTION OF COMPUTER INFORMATION SYSTEMS OF AGRICULTURAL ENTERPRISES Abstract: The article deals with some modern methods and technologies used in solving problems of information support of the effective management of the agricultural enterprise. It contains the princ 

Page: 1/1
1  
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.20 secs ]   [ Memory usage: 9.08MB ]   [ GZIP Disabled ]   [ Server load: 0.31 ]