• No results found

[PDF] Top 20 Steady: A Simple End-to-End Secure Logging System

Has 10000 "Steady: A Simple End-to-End Secure Logging System" found on our website. Below are the top 20 most common "Steady: A Simple End-to-End Secure Logging System".

Steady:  A  Simple  End-to-End  Secure  Logging  System

Steady: A Simple End-to-End Secure Logging System

... (SIEM) system. The centralised system serves as the primary means of monitoring ...a system expected to be operating is a case for concern and typically closely ... See full document

17

A Biometric Based Hybrid Approach to Secure End to End Communication with Symmetric Key Cryptography

A Biometric Based Hybrid Approach to Secure End to End Communication with Symmetric Key Cryptography

... the system. Starting from a simple representation of the pixel values of the image the keys can be even the hash value of the adjacent pixels in the image ...a simple yet effective one based on ... See full document

8

SEEMless:  Secure  End-to-End  Encrypted  Messaging  with  less  trust

SEEMless: Secure End-to-End Encrypted Messaging with less trust

... In our construction, SEEMless, the server maintains two aZKS at every epoch. In Section 4, we described how to construct a aZKS using a aSA, which in turn, we implemented using Patricia Trie. Recall that, in SEEMless, ... See full document

18

A Framework for Secure End to End Delivery of Messages in Publish/Subscribe Systems

A Framework for Secure End to End Delivery of Messages in Publish/Subscribe Systems

... In publish/subscribe systems typically there are one or more router nodes, referred to as brokers, which are responsible for routing messages from the publishers to the subscribers. Individual messages are routed based ... See full document

15

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users

... transmitting secure SMS from one MS to multiple MS ...is secure against replay attacks, MITM attacks, impersonation attacks, SMS disclo- sure and SMS spoofing, and also maintains untraceability, forward ... See full document

15

End to End System for Bacteria Habitat Extraction

End to End System for Bacteria Habitat Extraction

... NER system produces extremely low recall outputs, the relation extraction system will fail to extract some of the valid relations, simply because it only inves- tigates the existence of possible relations ... See full document

11

Investigating Entity Knowledge in BERT with Simple Neural End To End Entity Linking

Investigating Entity Knowledge in BERT with Simple Neural End To End Entity Linking

... When we compare BERT+Entity with the two results from Kolitsas et al. (2018), we observe that BERT+Entity improves over the baseline that models MD, CG and ED independently, and that BERT+Entity comes second to the ... See full document

9

End to end Argument Generation System in Debating

End to end Argument Generation System in Debating

... the system begins ...the system provides three generated paragraphs with their value titles such as poverty, pollution, and disease while the generated argument scripts are read aloud by our text-to-speech ... See full document

6

A Security Analysis of GSM Security Using ECC Technique

A Security Analysis of GSM Security Using ECC Technique

... GSM (Group Special Mobile or System for Mobile Communications) is the PAN-EUROPEAN standard for digital cellular communication. GSM provides enhanced features when compared with the older analog-based wireless ... See full document

8

End to End Support System for E Commerce

End to End Support System for E Commerce

... Proposed system uses an active record pattern strategy for ...this system the models object contains a resource model that maps an object to one or more database ... See full document

6

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture

... QoS and Security features are playing an important role in modern network architecures. Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other ... See full document

9

Design End to end Encryption based Biometric system for Security

Design End to end Encryption based Biometric system for Security

... The matching function, features extracted from the input fingerprint is compared against those in a database, which represents a single user (retrieved from the system database based on the claimed identity). The ... See full document

6

BioAMA: Towards an End to End BioMedical Question Answering System

BioAMA: Towards an End to End BioMedical Question Answering System

... (NLI)-based system that learns if the asser- tions made by the questions are true in the context of the ...this system, we first generate assertions from questions and eval- uate the entailment or ... See full document

9

A Purely End to End System for Multi speaker Speech Recognition

A Purely End to End System for Multi speaker Speech Recognition

... (GMM/HMM) system. Combination with an end- to-end ASR system was recently proposed in (Set- tle et al., 2018). Both these approaches either trained or pre-trained the source separation and ASR ... See full document

11

ConvLab: Multi Domain End to End Dialog System Platform

ConvLab: Multi Domain End to End Dialog System Platform

... an end-to- end ...up end-to-end experi- ments by simply modifying a few lines in the con- fig files as listed in Table ...the end- to-end task success rates are ...and ... See full document

6

End-to-End  Secure  Mobile  Group  Messaging  with  Conversation  Integrity   and  Deniability

End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability

... Asynchronous Ratcheting Trees (ART) [5] describes a group key agreement protocol with forward and backward— Post Compromise—secrecy. The protocol is asynchronous in that it allows a single user to set up the group key ... See full document

30

FAKTA: An Automatic End to End Fact Checking System

FAKTA: An Automatic End to End Fact Checking System

... With the rapid increase of fake news in social me- dia and its negative influence on people and pub- lic opinion (Mihaylov et al., 2015; Mihaylov and Nakov, 2016; Vosoughi et al., 2018), various orga- nizations are now ... See full document

6

The Enhancement of Routing Security in Mobile Ad hoc Networks

The Enhancement of Routing Security in Mobile Ad hoc Networks

... In this paper we study the routing security issues of MANETs, we propose an algorithm to detect malicious nodes based on intelligent water drops algorithm and examine "routing modification attack" problem that ... See full document

8

Secure end-to-end processing of smart metering data

Secure end-to-end processing of smart metering data

... menting secure data processing for big data applica- ...the secure content-based publish-subscribe service (SCBR) and the secure key-value store (Secure ...applications, end users with ... See full document

13

A Simple End to End Question Answering Model for Product Information

A Simple End to End Question Answering Model for Product Information

... new simple deep learning model for answering ques- tions about product facts and specifications 2) a new method for collecting data to train and evalu- ate our ... See full document

6

Show all 10000 documents...