Sciweavers

2474 search results - page 429 / 495
» Attacks on Steganographic Systems
Sort
View
CHI
2010
ACM
15 years 6 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
CARDIS
2010
Springer
187views Hardware» more  CARDIS 2010»
15 years 6 months ago
Improved Fault Analysis of Signature Schemes
At ACISP 2004, Giraud and Knudsen presented the first fault analysis of DSA, ECDSA, XTR-DSA, Schnorr and ElGamal signatures schemes that considered faults affecting one byte. The...
Christophe Giraud, Erik Woodward Knudsen, Michael ...
ACSAC
2009
IEEE
15 years 6 months ago
SecureMR: A Service Integrity Assurance Framework for MapReduce
—MapReduce has become increasingly popular as a powerful parallel data processing model. To deploy MapReduce as a data processing service over open systems such as service orient...
Wei Wei, Juan Du, Ting Yu, Xiaohui Gu
AVSS
2009
IEEE
15 years 6 months ago
Event Composition with Imperfect Information for Bus Surveillance
—Demand for bus surveillance is growing due to the increased threats of terrorist attack, vandalism and litigation. However, CCTV systems are traditionally used in forensic mode,...
Jianbing Ma, Weiru Liu, Paul Miller, Weiqi Yan
PDP
2009
IEEE
15 years 6 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...