Sciweavers

1663 search results - page 111 / 333
» Computer Security in the Real World
Sort
View
109
Voted
SOUPS
2010
ACM
15 years 7 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
NDSS
2008
IEEE
15 years 10 months ago
A Tune-up for Tor: Improving Security and Performance in the Tor Network
The Tor anonymous communication network uses selfreported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, thi...
Robin Snader, Nikita Borisov
ICPR
2008
IEEE
16 years 4 months ago
Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing
We propose a method for the detection of trends in social bookmarking systems. Compared to other work in this emerging field, our approach has a more sound statistical basis. In o...
Alexander Korth, Christian Bauckhage, Florian Metz...
ITC
2003
IEEE
135views Hardware» more  ITC 2003»
15 years 8 months ago
MEMS Design And Verification
The long term impact of MEMS technology will be in its ability to integrate novel sensing and actuation functionality on traditional computing and communication devices enabling t...
Tamal Mukherjee
SHAPE
1999
Springer
15 years 7 months ago
Geometric Grouping of Repeated Elements within Images
The objective of this work is the automatic detection and grouping of imaged elements which repeat in a scene. We show that structures that repeat in the world (for example wall p...
Frederik Schaffalitzky, Andrew Zisserman