Sciweavers

9503 search results - page 25 / 1901
» Authenticated System Calls
Sort
View
EUROSYS
2011
ACM
14 years 3 months ago
Fine-grained power modeling for smartphones using system call tracing
Abhinav Pathak, Y. Charlie Hu, Ming Zhang, Paramvi...
NOMS
2010
IEEE
163views Communications» more  NOMS 2010»
14 years 10 months ago
DReaM-Cache: Distributed Real-Time Transaction Memory Cache to support two-factor authentication services and its reliability
—PhoneFactor is a two-factor authentication service that combines the knowledge-based authenticator with an objectbased authenticator in which the object-based authenticator has ...
Haiyang Qian, Chandra Sekhar Surapaneni, Marsh Ray...
INFORMATICALT
2010
132views more  INFORMATICALT 2010»
14 years 9 months ago
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
15 years 1 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
CCS
2007
ACM
15 years 3 months ago
A framework for diversifying windows native APIs to tolerate code injection attacks
We present a framework to prevent code injection attacks in MS Windows using Native APIs in the operating system. By adopting the idea of diversity, this approach is implemented i...
Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis...