Sciweavers

2474 search results - page 443 / 495
» Attacks on Steganographic Systems
Sort
View
ICMI
2003
Springer
160views Biometrics» more  ICMI 2003»
15 years 5 months ago
Sensitivity to haptic-audio asynchrony
The natural role of sound in actions involving mechanical impact and vibration suggests the use of auditory display as an augmentation to virtual haptic interfaces. In order to bu...
Bernard D. Adelstein, Durand R. Begault, Mark R. A...
COMPSAC
2002
IEEE
15 years 4 months ago
Private Information Retrieval in the Presence of Malicious Failures
In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenge...
Erica Y. Yang, Jie Xu, Keith H. Bennett
OOPSLA
2001
Springer
15 years 4 months ago
Multitasking without Compromise: A Virtual Machine Evolution
The Multitasking Virtual Machine (called from now on simply MVM) is a modification of the Java™ virtual machine. It enables safe, secure, and scalable multitasking. Safety is ac...
Grzegorz Czajkowski, Laurent Daynès
ACSAC
2000
IEEE
15 years 4 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
15 years 4 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu