Sciweavers

143 search results - page 23 / 29
» A Range Test Secure in the Active Adversary Model
Sort
View
TOG
2012
181views Communications» more  TOG 2012»
11 years 11 months ago
Guided exploration of physically valid shapes for furniture design
Geometric modeling and the physical validity of shapes are traditionally considered independently. This makes creating aesthetically pleasing yet physically valid models challengi...
Nobuyuki Umetani, Takeo Igarashi, Niloy J. Mitra
ISSTA
2012
ACM
11 years 11 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
BIOSIG
2003
140views Biometrics» more  BIOSIG 2003»
13 years 10 months ago
Multifactor Biometric Sketch Authentication
: In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content...
Arslan Brömme, Stephan Al-Zubi
ACSAC
2003
IEEE
14 years 1 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
CCS
2009
ACM
14 years 3 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...