Sciweavers

704 search results - page 124 / 141
» A Practical Attack on KeeLoq
Sort
View
DISCEX
2003
IEEE
14 years 2 months ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 2 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
COMPSAC
2009
IEEE
14 years 2 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
CALC
2001
Springer
171views Cryptology» more  CALC 2001»
14 years 2 months ago
Approximate Integer Common Divisors
We show that recent results of Coppersmith, Boneh, Durfee and Howgrave-Graham actually apply in the more general setting of (partially) approximate common divisors. This leads us t...
Nick Howgrave-Graham
ECCV
2000
Springer
14 years 2 months ago
Approximate N-View Stereo
This paper introduces a new multi-view reconstruction problem called approximate N -view stereo. The goal of this problem is to recover a oneparameter family of volumes that are in...
Kiriakos N. Kutulakos