Sciweavers

1242 search results - page 64 / 249
» Digital Objects as Passwords
Sort
View
CCS
2007
ACM
15 years 4 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
DIM
2006
ACM
15 years 3 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
WMASH
2005
ACM
15 years 3 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina
CCS
2006
ACM
15 years 1 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
ICIP
2003
IEEE
15 years 11 months ago
Graph-based object tracking
This paper proposes a model-based methodology for recognizing and tracking objects in digital image sequences. Objects are represented by attributed relational graphs (or ARGs), w...
Cristina Gomila, Fernand Meyer