Sciweavers

551 search results - page 91 / 111
» Preventing existence
Sort
View
CSFW
2009
IEEE
15 years 4 months ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 4 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
ICDAR
2009
IEEE
15 years 4 months ago
Scene Text Extraction Using Focus of Mobile Camera
Robust extraction of text from scene images is essential for successful scene text recognition. Scene images usually have non-uniform illumination, complex background, and existen...
Egyul Kim, SeongHun Lee, JinHyung Kim
INFOCOM
2009
IEEE
15 years 4 months ago
Wi-Sh: A Simple, Robust Credit Based Wi-Fi Community Network
— Wireless community networks, where users share wireless bandwidth is attracting tremendous interest from academia and industry. Companies such as FON have been successful in at...
Xin Ai, Vikram Srinivasan, Chen-Khong Tham
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
15 years 4 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen