Sciweavers

12183 search results - page 75 / 2437
» Computers under Attacks!
Sort
View
ICPR
2010
IEEE
14 years 3 months ago
On-Line Video Recognition and Counting of Harmful Insects
This article is concerned with on-line counting of harmful insects of certain species in videos in the framework of in situ video-surveillance that aims at the early detection of ...
Ikhlef Bechar
RFIDSEC
2010
13 years 8 months ago
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for low-cost RFID tags. In this paper, we present a ...
Julio César Hernández Castro, Pedro ...
CCS
2009
ACM
14 years 2 months ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy