Sciweavers

1875 search results - page 65 / 375
» Modeling the Security of Steganographic Systems
Sort
View
WMASH
2003
ACM
15 years 6 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
SAFECOMP
1998
Springer
15 years 5 months ago
Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systems
The main focus of this paper is the problem of ensuring safety properties such as timeliness in safety critical systems. We introduce the OASIS model and its associated techniques ...
Vincent David, Jean Delcoigne, Evelyne Leret, Alai...
IEEEARES
2006
IEEE
15 years 6 months ago
Modeling Dependable Systems using Hybrid Bayesian Networks
A hybrid Bayesian Network (BN) is one that incorporates both discrete and continuous nodes. In our extensive applications of BNs for system dependability assessment the models are...
Martin Neil, Manesh Tailor, Norman E. Fenton, Davi...
100
Voted
ICASSP
2010
IEEE
15 years 27 days ago
Revisiting the security of speaker verification systems against imposture using synthetic speech
In this paper, we investigate imposture using synthetic speech. Although this problem was first examined over a decade ago, dramatic improvements in both speaker verification (S...
Phillip L. De Leon, Vijendra Raj Apsingekar, Micha...
TIT
2008
84views more  TIT 2008»
15 years 18 days ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild