Sciweavers

1663 search results - page 50 / 333
» Computer Security in the Real World
Sort
View
CARDIS
2006
Springer
101views Hardware» more  CARDIS 2006»
14 years 16 days ago
Smartcard Firewalls Revisited
Smartcards are being used as secure endpoints in computer transactions. Recently, the connectivity of smartcards has increased and future smartcards will be able to communicate ove...
Henrich Christopher Pöhls, Joachim Posegga
CVPR
2004
IEEE
14 years 10 months ago
Color Lines: Image Specific Color Representation
The problem of deciding whether two pixels in an image have the same real world color is a fundamental problem in computer vision. Many color spaces are used in different applicat...
Ido Omer, Michael Werman
PET
2007
Springer
14 years 2 months ago
Anonymity in the Wild: Mixes on Unstructured Networks
Abstract. As decentralized computing scenarios get ever more popular, unstructured topologies are natural candidates to consider running mix networks upon. We consider mix network ...
Shishir Nagaraja
AGENTS
1997
Springer
14 years 29 days ago
Adaptable Local Level Arbitration of Behaviors
During the last few years, and in an attempt to provide an ecient alternative to classical methods to designing robot control structures, the behavior-based approach has emerged....
Mohamed Salah Hamdi, Karl Kaiser
ISPEC
2007
Springer
14 years 3 months ago
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
Abstract. With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital d...
Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu