Sciweavers

499 search results - page 27 / 100
» A Study on Latent Vulnerabilities
Sort
View
SSWMC
2004
15 years 1 months ago
Attacks on biometric systems: a case study in fingerprints
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
Umut Uludag, Anil K. Jain
101
Voted
CIKM
2009
Springer
15 years 7 months ago
Cross-language linking of news stories on the web using interlingual topic modelling
We have studied the problem of linking event information across different languages without the use of translation systems or dictionaries. The linking is based on interlingua in...
Wim De Smet, Marie-Francine Moens
COREGRID
2007
Springer
15 years 6 months ago
Dependable Grid Services: A Case Study with OGSA-DAI
Grid middleware usually makes use of several software modules that due to their complexity and development approach may have some latent bugs and leaks. These bugs can cause visibl...
Javier Alonso, Jordi Torres, Luís Moura Sil...
SOUPS
2006
ACM
15 years 6 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden
INFOCOM
2008
IEEE
15 years 6 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan