Careless attention to opening files, often caused by problems with path traversal or shared directories, can expose applications to attacks on the file names that they use. In t...
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
The damage inflicted by viruses and worms has been limited because the payloads that are most lucrative to malware authors have also posed the greatest risks to them. The problem...