Sciweavers

550 search results - page 83 / 110
» A lightweight approach to state based security testing
Sort
View
CCS
2009
ACM
15 years 4 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov
IWDW
2005
Springer
15 years 3 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
MOBIWAC
2006
ACM
15 years 3 months ago
Calibration-free WLAN location system based on dynamic mapping of signal strength
In this work we present a calibration-free system for locating wireless local area network devices, based on the radio frequency characteristics of such networks. Calibration proc...
Luís Felipe M. de Moraes, Bruno Astuto A. N...
COMSWARE
2006
IEEE
15 years 3 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
ICDAR
2009
IEEE
15 years 4 months ago
Handwritten Text Line Segmentation by Shredding Text into its Lines
In this paper, we propose a novel technique to segment handwritten document images into text lines by shredding their surface with local minima tracers. Our approach is based on t...
Anguelos Nicolaou, Basilios Gatos