Sciweavers

39 search results - page 7 / 8
» The Myth of the Average User: Improving Privacy and Security...
Sort
View
CCS
2010
ACM
14 years 5 days ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
KES
2005
Springer
13 years 10 months ago
Zero-Based Code Modulation Technique for Digital Video Fingerprinting
Digital fingerprinting is a technique to protect digital contents from illegal reproduction and redistribution by marking unique information for individual user. A powerful but sim...
In Koo Kang, Hae-Yeoun Lee, Won-Young Yoo, Heung-K...
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
13 years 11 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
ISI
2007
Springer
13 years 11 months ago
Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment
—Semantic Event Tracker (SET) is a highly interactive visualization tool for tracking and associating activities (events) in a spatially and Multimedia Enriched Virtual Environme...
Leonidas Deligiannidis, Farshad Hakimpour, Amit P....
ACSAC
2006
IEEE
13 years 11 months ago
Foreign Code Detection on the Windows/X86 Platform
As new attacks against Windows-based machines emerge almost on a daily basis, there is an increasing need to “lock down” individual users’ desktop machines in corporate comp...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...