Sciweavers

1663 search results - page 179 / 333
» Computer Security in the Real World
Sort
View
ICMCS
2008
IEEE
439views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Framework for virtual collaboration emphasized by awareness information and asynchronous interaction
In this paper, we propose a framework which allows remote users to form conversation groups based on spatial relationship in a shared virtual space. Our proposed framework can tra...
Tomo Matsuda, Naoki Shibata, Keiichi Yasumoto, Min...
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 10 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
DSN
2004
IEEE
15 years 7 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
RAID
2010
Springer
15 years 2 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
CVPR
1996
IEEE
16 years 6 months ago
A Stereo Machine for Video-Rate Dense Depth Mapping and Its New Applications
We have developed a video-rate stereo machine that has the capability of generating a dense depth map at the video rate. The performance bench marks of the CMU video-rate stereo m...
Takeo Kanade, Atsushi Yoshida, Kazuo Oda, Hiroshi ...