Sciweavers

1663 search results - page 105 / 333
» Computer Security in the Real World
Sort
View
PUC
2010
139views more  PUC 2010»
13 years 7 months ago
Digital plumbing: the mundane work of deploying UbiComp in the home
Deploying UbiComp in real homes is central to realizing Weiserʼs grand vision of ʻinvisibleʼ computing. It is essential to moving design out of the lab and making it into an unr...
Peter Tolmie, Andy Crabtree, Stefan Rennick Eggles...
WWW
2010
ACM
14 years 4 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
CVPR
2007
IEEE
14 years 3 months ago
Secure Biometric Templates from Fingerprint-Face Features
Since biometric data cannot be easily replaced or revoked, it is important that biometric templates used in biometric applications should be constructed and stored in a secure way...
Yagiz Sutcu, Qiming Li, Nasir D. Memon

Book
996views
15 years 6 months ago
The Scientist and Engineer's Guide to Digital Signal Processing
"The world of science and engineering is filled with signals: images from remote space probes, voltages generated by the heart and brain, radar and sonar echoes, seismic vibra...
Steve Smith
GI
2008
Springer
13 years 10 months ago
Context, emergent game play and the mobile gamer as producer
: The emerging tensions between the mobile application logic and the unfolding dynamic context of use belong to the core challenges of ubiquitous computing today. Starting from and...
Stephan Wolff, Barbara Grüter