Sciweavers

495 search results - page 78 / 99
» MASC - Monitoring and Security of Containers
Sort
View
IROS
2006
IEEE
140views Robotics» more  IROS 2006»
15 years 4 months ago
Developing a non-intrusive biometric environment
— The development of large scale biometric systems requires experiments to be performed on large amounts of data. Existing capture systems are designed for fixed experiments and...
Lee Middleton, David K. Wagg, Alex I. Bazin, John ...
68
Voted
NDSS
2006
IEEE
15 years 4 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
ICALP
2005
Springer
15 years 3 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
74
Voted
FPL
2004
Springer
154views Hardware» more  FPL 2004»
15 years 3 months ago
High Performance True Random Number Generator in Altera Stratix FPLDs
Abstract. The paper presents a high performance True Random Number Generator (TRNG) embedded in Altera Stratix Field Programmable Logic Devices (FPLDs). As a source of randomness, ...
Viktor Fischer, Milos Drutarovský, Martin S...
ISCIS
2004
Springer
15 years 3 months ago
Coordinating Distributed Autonomous Agents with a Real-Time Database: The CAMBADA Project
Interest on using mobile autonomous agents has been growing, recently, due to their capacity to cooperate for diverse purposes, from rescue to demining and security. However, such ...
Luís Almeida, Frederico Santos, Tullio Facc...