Sciweavers

9503 search results - page 36 / 1901
» Authenticated System Calls
Sort
View
ICCS
2003
Springer
15 years 9 months ago
Method Call Acceleration in Embedded Java Virtual Machines
Object oriented languages, in particular Java, use a frequent dynamic dispatch mechanism to search for the definition of an invoked method. A method could be defined in more than...
Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia...
ISDA
2009
IEEE
15 years 11 months ago
Event Related Biometrics: Towards an Unobtrusive Sensing Seat System for Continuous Human Authentication
—The present work is focused on the improvement of a Sensing Seat system previously developed by the authors for the initial authentication purpose in office and car scenarios. ...
Marcello Ferro, Giovanni Pioggia, Alessandro Togne...
DASC
2006
IEEE
15 years 10 months ago
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems
Abstract— In stream authentication protocols used for largescale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and ...
Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Govern...
BIOSIG
2003
140views Biometrics» more  BIOSIG 2003»
15 years 5 months ago
Multifactor Biometric Sketch Authentication
: In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content...
Arslan Brömme, Stephan Al-Zubi
CCS
2010
ACM
15 years 4 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann