Sciweavers

2237 search results - page 70 / 448
» On the Security of Random Sources
Sort
View
ICBA
2004
Springer
143views Biometrics» more  ICBA 2004»
15 years 10 months ago
Externalized Fingerprint Matching
The 9/11 tragedy triggered an increased interest in biometric passports. According to several sources [2], the electronic ID market is expected to increase by more than 50% per ann...
Claude Barral, Jean-Sébastien Coron, David ...
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 8 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
187
Voted
KES
2008
Springer
15 years 4 months ago
A Secure Mediator for Integrating Multiple Level Access Control Policies
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Isabel F. Cruz, Rigel Gjomemo, Mirko Orsini
OOPSLA
2005
Springer
15 years 10 months ago
CodeQuest: querying source code with datalog
We describe CodeQuest, a system for querying source code. It combines two previous proposals, namely the use of logic programming and database system. Experiments (on projects ran...
Elnar Hajiyev, Mathieu Verbaere, Oege de Moor, Kri...
OOPSLA
2005
Springer
15 years 10 months ago
SDD: high performance code clone detection system for large scale source code
Code clones in software increase maintenance cost and lower software quality. We have devised a new algorithm to detect duplicated parts of source code in large software. Our algo...
Seunghak Lee, Iryoung Jeong