Sciweavers

5722 search results - page 468 / 1145
» Security Function Interactions
Sort
View
MOBILITY
2009
ACM
15 years 11 months ago
Detection of images with adult content for parental control on mobile devices?
In this paper we present a prototype for parental control that detects images with adult content received on a mobile device. More specifically, the application that we developed...
Giuseppe Amato, Paolo Bolettieri, Gabriele Costa, ...
IEEEARES
2008
IEEE
15 years 11 months ago
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
Sini Ruohomaa, Lea Kutvonen
AINA
2007
IEEE
15 years 11 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
FC
2007
Springer
141views Cryptology» more  FC 2007»
15 years 11 months ago
WSKE: Web Server Key Enabled Cookies
In this paper, we present the design and prototype of a new approach to cookie management: if a server deposits a cookie only after authenticating itself via the SSL handshake, the...
Chris Masone, Kwang-Hyun Baek, Sean W. Smith
PERVASIVE
2007
Springer
15 years 11 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen