Sciweavers

232 search results - page 30 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
CHI
2010
ACM
14 years 4 months ago
Enhancing web page readability for non-native readers
Readers face many obstacles on today’s Web, including distracting content competing for the user’s attention and other factors interfering with comfortable reading. On todayâ€...
Chen-Hsiang Yu, Robert C. Miller
CHI
2010
ACM
14 years 4 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 4 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ADBIS
2009
Springer
128views Database» more  ADBIS 2009»
14 years 4 months ago
Detecting Moving Objects in Noisy Radar Data Using a Relational Database
Abstract. In moving object databases, many authors assume that number and position of objects to be processed are always known in advance. Detecting an unknown moving object and pu...
Andreas Behrend, Rainer Manthey, Gereon Schül...
ICC
2007
IEEE
14 years 4 months ago
ZigBee-based Intra-car Wireless Sensor Network
— Due to an increasing number of sensors deployed in cars, recently there is a growing interest in implementing a wireless sensor network within a car. In this paper, we report t...
Hsin-Mu Tsai, Cem U. Saraydar, Timothy Talty, Mich...