Sciweavers

495 search results - page 70 / 99
» MASC - Monitoring and Security of Containers
Sort
View
OOPSLA
2010
Springer
14 years 10 months ago
The Tower of Babel did not fail
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
Paul Adamczyk, Munawar Hafiz
ICPR
2010
IEEE
14 years 9 months ago
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing
The advance of falsification technology increases security concerns and gives biometrics an important role in security solutions. The electrocardiogram (ECG) is an emerging biometr...
David Pereira Coutinho, Ana L. N. Fred, Már...
CCS
2007
ACM
15 years 6 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
79
Voted
CCS
2007
ACM
15 years 6 months ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}...
Ueli M. Maurer, Stefano Tessaro