Sciweavers

8177 search results - page 77 / 1636
» Detecting System Emulators
Sort
View
ESORICS
2012
Springer
12 years 14 days ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
CASES
2010
ACM
13 years 8 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont

Lecture Notes
773views
15 years 8 months ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain
ICCV
2005
IEEE
14 years 12 months ago
3D Object Reconstruction from a Single 2D Line Drawing without Hidden Lines
The human vision system can interpret a single 2D line drawing as a 3D object without much difficulty even if the hidden lines of the object are invisible. Several reconstruction ...
Liangliang Cao, Jianzhuang Liu, Xiaoou Tang
AINA
2009
IEEE
14 years 4 months ago
Massively Scalable Web Service Discovery
The increasing popularity of Web Services (WS) has exemplified the need for scalable and robust discovery mechanisms. Although decentralized solutions for discovering WS promise ...
George Anadiotis, Spyros Kotoulas, Holger Lausen, ...