Sciweavers

1462 search results - page 235 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
EUROSPI
2005
Springer
15 years 7 months ago
Safety Methods in Software Process Improvement
Even if the application developers produce software in accordance with the customer requirements, they cannot guarantee that the software will behave in a safe way during the lifet...
Torgrim Lauritsen, Tor Stålhane
ACIVS
2009
Springer
14 years 11 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...
JOC
2010
92views more  JOC 2010»
14 years 8 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
CN
2006
161views more  CN 2006»
15 years 1 months ago
A multimedia traffic modeling framework for simulation-based performance evaluation studies
The emergence of high-speed communication systems has enabled the support of complex multimedia applications. The traffic patterns generated by such applications are likely to be ...
Assen Golaup, Hamid Aghvami
SIGUCCS
2003
ACM
15 years 7 months ago
Higher education ERP: a framework to reduce the pain
Higher Education Institutions are now spending a significant portion of their budget to implement and maintain modern Enterprise Resource Planning (ERP) solutions. ERP is a softwa...
Kris T. Pegah, Mahmoud Pegah, Terry M. Dillow