Sciweavers

414 search results - page 30 / 83
» Secure Border Control Processes
Sort
View
TGC
2005
Springer
15 years 5 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
CSREASAM
2006
15 years 1 months ago
Security Requirements for Multimodal Biometric Systems
Biometrics systems are automated systems that recognize a person based on physical or behavioral characteristics. There are a number of primary biometric disciplines including fin...
Kevin Daimi, Katherine Snyder
HASE
2008
IEEE
15 years 6 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...
GRID
2008
Springer
14 years 11 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...
USS
2010
14 years 9 months ago
Securing Script-Based Extensibility in Web Browsers
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
Vladan Djeric, Ashvin Goel