Πλοήγηση ανά Θέμα "Trusted third parties"
Αποτελέσματα 1-2 από 2
-
An architecture for secure VoiIP and collaboration applications
(2007)VoIP and collaboration Internet applications are a driving force for the use and expansion of the Internet. Current applications usually require end user registration in a central user database, which in turn provides ... -
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts
(2021)Cyber-security attacks are becoming more frequent and more severe day by day. To detect the execution of such attacks, organizations install intrusion detection systems. It would be beneficial for such organizations to ...