Sciweavers

10 search results - page 2 / 2
» A Study on Vulnerability in On-line Writer Verification Syst...
Sort
View
WWW
2005
ACM
14 years 5 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
ICPR
2008
IEEE
14 years 6 months ago
Fake fingertip generation from a minutiae template
This work reports a preliminary study on the vulnerability evaluation of fingerprint verification systems to direct attacks carried out with fake fingertips created from minutiae ...
Alessandra Lumini, Davide Maltoni, Javier Galbally...
DAC
2004
ACM
14 years 5 months ago
A scalable soft spot analysis methodology for compound noise effects in nano-meter circuits
Circuits using nano-meter technologies are becoming increasingly vulnerable to signal interference from multiple noise sources as well as radiation-induced soft errors. One way to...
Chong Zhao, Xiaoliang Bai, Sujit Dey
ESOP
2010
Springer
14 years 2 months ago
Faulty Logic: Reasoning about Fault Tolerant Programs
Transient faults are single-shot hardware errors caused by high energy particles from space, manufacturing defects, overheating, and other sources. Such faults can be devastating f...
Matthew L. Meola and David Walker
ENTCS
2010
99views more  ENTCS 2010»
13 years 4 months ago
State Based Robustness Testing for Components
Component based development allows to build software upon existing components and promises to improve software reuse and reduce costs. To gain reliability of a component based sys...
Bin Lei, Zhiming Liu, Charles Morisset, Xuandong L...