The paper covers a method of allowing a client to browse an image to examine it in detail, while making it difficult to steal. It differs from invisible watermarking methods in th...
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
Context: Object-oriented languages such as Java, Smalltalk, and C++ structure their programs using packages. Maintainers of large systems need to understand how packages relate to...
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...