Sciweavers

1353 search results - page 162 / 271
» Securing Current and Future Process Control Systems
Sort
View
140
Voted
RSP
2003
IEEE
103views Control Systems» more  RSP 2003»
15 years 9 months ago
An Instruction Throughput Model of Superscalar Processors
With advances in semiconductor technology, processors are becoming larger and more complex. Future processor designers will face an enormous design space, and must evaluate more a...
Tarek M. Taha, D. Scott Wills
125
Voted
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
15 years 9 months ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
106
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Is voice transformation a threat to speaker identification?
With the development of voice transformation and speech synthesis technologies, speaker identification systems are likely to face attacks from imposters who use voice transformed ...
Qin Jin, Arthur R. Toth, Alan W. Black, Tanja Schu...
162
Voted
ISI
2004
Springer
15 years 9 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
139
Voted
EUROSYS
2006
ACM
16 years 24 days ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...