Sciweavers

3420 search results - page 563 / 684
» A Language-Based Approach to Security
Sort
View
ICPR
2010
IEEE
13 years 9 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan
GLOBECOM
2010
IEEE
13 years 8 months ago
Authenticating MIMO Transmissions Using Channel-Like Fingerprinting
Abstract-- A framework for introducing an extrinsic fingerprint signal to space-time coded transmissions at the physical-layer is presented, whereby the fingerprint signal conveys ...
Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Ch...
GLOBECOM
2010
IEEE
13 years 8 months ago
Independent Parallel Compact Finite Automatons for Accelerating Multi-String Matching
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS) and anti-virus scanners. Existing DFA-based ...
Yi Tang, Junchen Jiang, Xiaofei Wang, Bin Liu, Yan...
RAID
2010
Springer
13 years 8 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
IJNSEC
2010
143views more  IJNSEC 2010»
13 years 5 months ago
Nonce Generation For The Digital Signature Standard
Digital Signature Algorithm (DSA) is an underlying algorithm to form a signature in the Digital Signature Standard (DSS). DSA uses a new random number (or nonce) each time a signa...
Rajendra S. Katti, Rajesh G. Kavasseri