Sciweavers

9503 search results - page 110 / 1901
» Authenticated System Calls
Sort
View
130
Voted
ADHOC
2007
104views more  ADHOC 2007»
15 years 5 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
AIL
2006
84views more  AIL 2006»
15 years 5 months ago
Meaningful electronic signatures based on an automatic indexing method
Legal information certification and secured storage combined with documents electronic signature are of great interest when digital documents security and conservation are in conce...
Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous, Nat...
139
Voted
ISI
2006
Springer
15 years 5 months ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen
TOG
2012
160views Communications» more  TOG 2012»
13 years 7 months ago
Highlight microdisparity for improved gloss depiction
Human stereo perception of glossy materials is substantially different from the perception of diffuse surfaces: A single point on a diffuse object appears the same for both eyes, ...
Krzysztof Templin, Piotr Didyk, Tobias Ritschel, K...
141
Voted
IWIA
2005
IEEE
15 years 10 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp