Sciweavers

18 search results - page 3 / 4
» E-Commerce Authentication: An Effective Countermeasures Desi...
Sort
View
ITS
1998
Springer
102views Multimedia» more  ITS 1998»
13 years 10 months ago
Verbal Coaching During a Real-Time Task
TRANSoM is a collaborative effort among university and industry researchers aimed at producing an intelligent tutoring system for training pilots of remotely operated vehicles (ROV...
Bruce Roberts, Nicholas J. Pioch, William Ferguson
IAJIT
2010
133views more  IAJIT 2010»
13 years 4 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
GAMESEC
2010
128views Game Theory» more  GAMESEC 2010»
13 years 4 months ago
Tracking Games in Mobile Networks
Abstract. Users of mobile networks can change their identifiers in regions called mix zones in order to defeat the attempt of third parties to track their location. Mix zones must ...
Mathias Humbert, Mohammad Hossein Manshaei, Julien...
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
13 years 6 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
WORM
2003
13 years 7 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...