Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
This tutorial does more than simply explain hashing and collision resolution. It lets you try out hash functions and collision resolution methods for yourself so that you can reall...
Research has been active in thefield offorgeiy detection, but relatively little work has been done on the detection of skilled forgeries. In thispaper, we present an algorithmfor ...
Jinhong Katherine Guo, David S. Doermann, Azriel R...
In this paper we present the process of designing and developing a fully functional and interactive AR handheld device. Based on a human-centered approach we describe the results ...
ISO 14443 compliant smartcards are widely-used in privacy and security sensitive applications. Due to the contactless interface, they can be activated and read out from a distance....