Sciweavers

416 search results - page 22 / 84
» Some new approaches for preventing software tampering
Sort
View
103
Voted
BMCBI
2006
124views more  BMCBI 2006»
14 years 11 months ago
ZCURVE_V: a new self-training system for recognizing protein-coding genes in viral and phage genomes
Background: It necessary to use highly accurate and statistics-based systems for viral and phage genome annotations. The GeneMark systems for gene-finding in virus and phage genom...
Feng-Biao Guo, Chun-Ting Zhang
CCECE
2006
IEEE
15 years 5 months ago
Security Design Patterns: Survey and Evaluation
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the apperance of this rese...
Marc-André Laverdière, Azzam Mourad,...
94
Voted
ESSOS
2009
Springer
15 years 4 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 11 months ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
14 years 9 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov