Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 21-30 of 47 total results
ACS Team - www.acs.ase.ro @ Department of Economic ...
ACS Team. Tags: ACS Team ACS - Applied Computer Science And Cyber Security Team - (ACS + ACS = 2 * ACS = acs.ase.ro) is formed by some members of the "IT & Computer Science" groups from the Department of Economic Informatics and Cybernetics (dice.ase.ro), of the Faculty of Cybernetics, Statistics and Economic Informatics (csie.ase.ro) from Bucharest University of Economic Studies ().
www.acs.ase.ro/acs-team
Average Rating (0 votes)
Security Survey of Internet Browsers Data Managers
Abstract The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored.
 Information Security Standards - Semantic Scholar
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 129 interchangeability - and at an economical cost. We need information security standards in order to implement information security controls to meet an organizations requirements as well as a set of controls
CheckPDF: Check What is Inside Before Signing a PDF Document
A. Alsaid and C. J. Mitchell. Dynamic Content Attacks on Digital Signatures. In: Information Management and Computer Security, 13(4):328–336, 2005.
Assessment of Secure OpenID-Based DAAA Protocol for ...
It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous types of online web-based applications in the present era. An innovative ID management system is required for managing the user IDs. The OpenID lightweight protocol is a better solution to manage the user IDs. In an OpenID communication environment, OpenID URL is not secured in a session ...
 Facial Recognition using OpenCV - Semantic Scholar
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012 ISSN 2067 – 4074 39 is processed to crop and extract the person’s face for easier recognition. Face Recognition where that detected and processed face is compared to a database of known faces, to decide who that person is. Since 2002, face detection can be
Detection of Obfuscation in Java Malware - ScienceDirect
Watermarking, tamper-proofing, and obfuscation - tools for software protection, In IEEE Transactions on Software Engineering, volume 28, pages 735–746, August 2002. 13. Florin BUZATU, “Methods for obfuscating Java programs†, Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012 14.
IE-ASE 2014 : The 13th International Conference on ...
Journal of Mobile, Embedded and Distributed Systems (JMEDS) - www.jmeds.eu International Journal of Economic Practices and Theories (IJEPT) - www.ijept.org and will be indexed by major databases: ISI Thomson Reuters Services Directory of Open Access Journal Cabell’s Directories of Publishing Opportunities EBSCO (Business Source Complete) ICAAP
 Conference Program
7 Conference Presentations Program Cloud and Distributed/Parallel Computing SECTION 1 Thursday, 17 May, 13:30 - 15:15– Room R 411 Chairmen: Alin ZAMFIROIU, Alexandru TUGUI Secretary: Ana-Maria GHEORGHE 1. CHARACTERISTICS OF OPEN GRID SERVICES ARCHITECTURE -
ISM – IT&C Security Master – Informatics Security Master ...
The IT&C SECURITY MASTER – ISM program is organized since 2005 within the Department of Economic Informatics and Cybernetics ... Journal of Mobile, Embedded and Distributed Systems. Scientific / Tech. Handbook. Information Security Handbook. Scientific. NEWS. Recent news entries about the master and Information Security.
ism.ase.ro/
Average Rating (0 votes)
1 2 3 4 5
Pages
|