Sciweavers

1843 search results - page 258 / 369
» Securing Class Initialization
Sort
View
125
Voted
CRYPTO
2008
Springer
75views Cryptology» more  CRYPTO 2008»
15 years 2 months ago
New Efficient Attacks on Statistical Disclosure Control Mechanisms
The goal of a statistical database is to provide statistics about a population while simultaneously protecting the privacy of the individual records in the database. The tension be...
Cynthia Dwork, Sergey Yekhanin
IMC
2007
ACM
15 years 2 months ago
A brief history of scanning
Incessant scanning of hosts by attackers looking for vulnerable servers has become a fact of Internet life. In this paper we present an initial study of the scanning activity obse...
Mark Allman, Vern Paxson, Jeff Terrell
131
Voted
BIOSIG
2008
166views Biometrics» more  BIOSIG 2008»
15 years 2 months ago
Improving Border Control with 3D Face Recognition
: Biometric data have been integrated in all new European passports, since the member states of the European Commission started to implement the EU Council Regulation No 2252/2004 ...
Paul Welti, Jean-Marc Suchier, Christoph Busch
116
Voted
CSREASAM
2008
15 years 2 months ago
3D Face Recognition for Unattended Border Control
Biometric data have been integrated in all new European passports, since the member states of the European Commission started to implement the EU Council Regulation No 2252/2004 on...
Christoph Busch, Alexander Nouak
144
Voted
CCN
2006
278views Communications» more  CCN 2006»
15 years 2 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis