Sciweavers

6555 search results - page 1118 / 1311
» Secure attribute-based systems
Sort
View
ISSTA
2004
ACM
15 years 9 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
132
Voted
MM
2004
ACM
136views Multimedia» more  MM 2004»
15 years 9 months ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski
91
Voted
FC
2004
Springer
89views Cryptology» more  FC 2004»
15 years 8 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost e...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
114
Voted
MIDDLEWARE
2004
Springer
15 years 8 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
136
Voted
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
15 years 8 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
« Prev « First page 1118 / 1311 Last » Next »