Sciweavers

347 search results - page 33 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
INFOCOM
2006
IEEE
15 years 4 months ago
A Comparative Study of the DNS Design with DHT-Based Alternatives
— The current Domain Name System (DNS) follows a hierarchical tree structure. Several recent efforts proposed to re-implement DNS as a peer-to-peer network with a flat structure...
Vasileios Pappas, Daniel Massey, Andreas Terzis, L...
DSN
2008
IEEE
15 years 4 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
15 years 4 months ago
Stakeholders, Contradictions and Salience: An Empirical Study of a Norwegian G2G Effort
Previous studies indicate that the expected effects of e-Government are slower to realize than initially expected. Several authors argue that e-Government involves particularly co...
Leif Skiftenes Flak, Stig Nordheim
IWIA
2006
IEEE
15 years 4 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
ISI
2006
Springer
14 years 10 months ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen