Sciweavers

1936 search results - page 165 / 388
» Unbundling Active Functionality
Sort
View
IJDE
2006
95views more  IJDE 2006»
15 years 3 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
283
Voted

Tutorial
2720views
17 years 3 months ago
Hashing Tutorial
This tutorial does more than simply explain hashing and collision resolution. It lets you try out hash functions and collision resolution methods for yourself so that you can reall...
Cliff Shaffer
ICPR
2000
IEEE
16 years 4 months ago
Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties
Research has been active in thefield offorgeiy detection, but relatively little work has been done on the detection of skilled forgeries. In thispaper, we present an algorithmfor ...
Jinhong Katherine Guo, David S. Doermann, Azriel R...
ISMAR
2007
IEEE
15 years 10 months ago
Human-Centered Development of an AR Handheld Display
In this paper we present the process of designing and developing a fully functional and interactive AR handheld device. Based on a human-centered approach we describe the results ...
Raphael Grasset, Andreas Dünser, Mark Billing...
112
Voted
WISTP
2007
Springer
15 years 10 months ago
An Embedded System for Practical Security Analysis of Contactless Smartcards
ISO 14443 compliant smartcards are widely-used in privacy and security sensitive applications. Due to the contactless interface, they can be activated and read out from a distance....
Timo Kasper, Dario Carluccio, Christof Paar