Sciweavers

187 search results - page 18 / 38
» Challenges in Securing the Domain Name System
Sort
View
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
14 years 5 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
IACR
2011
94views more  IACR 2011»
12 years 10 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
AR
2006
87views more  AR 2006»
13 years 11 months ago
Rescue robotics - A crucial milestone on the road to autonomous systems
Rescue robotics is an important steppingstone in the scientific challenge to create autonomous systems. There is a significant market for rescue robots, which has unique features ...
Andreas Birk 0002, Stefano Carpin
IVIC
2009
Springer
14 years 5 months ago
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
Abstract. Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recen...
Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Con...
AGENTS
1999
Springer
14 years 3 months ago
Exception Handling in Agent Systems
A critical challenge to creating effective agent-based systems is allowing them to operate effectively when the operating environment is complex, dynamic, and error-prone. In this...
Mark Klein, Chrysanthos Dellarocas