Sciweavers

1663 search results - page 42 / 333
» Computer Security in the Real World
Sort
View
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
12 years 11 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
CW
2005
IEEE
14 years 1 months ago
The Interactive 3D BreakAway Map: A navigation and examination aid for multi-floor 3D worlds
In this paper, we propose the Interactive 3D BreakAway Map (I3BAM), an extension of the wellknown Worlds In Miniature [6]. The I3BAM supports user navigation in virtual buildings ...
Luca Chittaro, Vijay Kumar Gatla, Subramanian Venk...
ICPADS
2005
IEEE
14 years 1 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
ICC
2007
IEEE
14 years 1 months ago
Towards Sender-Based TFRC
—Pervasive communications are increasingly sent over mobile devices and personal digital assistants. This trend has been observed during the last football world cup where cellula...
Guillaume Jourjon, Emmanuel Lochin, Patrick S&eacu...
CW
2003
IEEE
14 years 27 days ago
PRESENCE : The Sense of Believability of Inaccessible Worlds
With the development of new instruments as telecommunication, teleoperation, computer representation tools, human beings are commonly in situation to perceive and act on spaces th...
Annie Luciani, Daniela Urma, Sylvain Marliè...