Sciweavers

12183 search results - page 161 / 2437
» Computers under Attacks!
Sort
View
SOUPS
2005
ACM
15 years 10 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
IPPS
2006
IEEE
15 years 11 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
EUROCRYPT
1998
Springer
15 years 9 months ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro
173
Voted
CVPR
2012
IEEE
13 years 7 months ago
Camera spectral sensitivity estimation from a single image under unknown illumination by using fluorescence
Camera spectral sensitivity plays an important role for various color-based computer vision tasks. Although several methods have been proposed to estimate it, their applicability ...
Shuai Han, Yasuyuki Matsushita, Imari Sato, Takahi...
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 11 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee