𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Applying military grade security to the Internet

✍ Scribed by C.I. Dalton; J.F. Griffin


Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
998 KB
Volume
29
Category
Article
ISSN
0169-7552

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Multivariate Bayesian regression applied
✍ Kostas Triantafyllopoulos; John Pikoulas πŸ“‚ Article πŸ“… 2002 πŸ› John Wiley and Sons 🌐 English βš– 159 KB

## Abstract An Erratum has been published for this article in Journal of Forecasting 23(6): 461 (2004). This paper examines the problem of intrusion in computer systems that causes major breaches or allows unauthorized information manipulation. A new intrusion‐detection system using Bayesian multi

The best of both worlds: Applying secure
✍ Julien Bringer; HervΓ© Chabanne; Bruno Kindarji πŸ“‚ Article πŸ“… 2008 πŸ› Elsevier Science 🌐 English βš– 507 KB

Cancelable biometrics and secure sketches have been introduced with the same purpose in mind: to protect the privacy of biometric templates while keeping the ability to match this protected data against a reference. The paradigm beyond cancelable biometrics is to perform an irreversible transformati

An early application of the Bell Labs Se
✍ Vijay K. Gurbani; Andrew R. McGee πŸ“‚ Article πŸ“… 2007 πŸ› Institute of Electrical and Electronics Engineers 🌐 English βš– 173 KB

The Bell Labs Security Framework provides a comprehensive matrix that can be used to evaluate the security of an application (service), host, protocol, or communication link. The methodology has been used to assess the security of information technology (IT) and telecommunications services, as well