Sciweavers

2429 search results - page 358 / 486
» Using Aspects to Design a Secure System
Sort
View
HAPTICS
2006
IEEE
15 years 4 months ago
Haptic-Based Biometrics: A Feasibility Study
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Sh...
NGC
2000
Springer
15 years 1 months ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
CCS
2008
ACM
14 years 12 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
IROS
2006
IEEE
127views Robotics» more  IROS 2006»
15 years 4 months ago
A Pilot Study on Teleoperated Mobile Robots in Home Environments
– Mobile robots operating in home environments must deal with constrained space and a great variety of obstacles and situations to handle. This article presents a pilot study aim...
Daniel Labonte, François Michaud, Patrick B...
MOBISYS
2007
ACM
15 years 9 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi