Sciweavers

76 search results - page 7 / 16
» From Passive to Covert Security at Low Cost
Sort
View
SSWMC
2004
13 years 9 months ago
Signature-embedding in printed documents for security and forensic applications
Despite the increase in email and other forms of digital communication, the use of printed documents continues to increase every year. Many types of printed documents need to be &...
Aravind K. Mikkilineni, Gazi N. Ali, Pei-Ju Chiang...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 2 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
DICTA
2008
13 years 9 months ago
Realtime Visual Tracking of Aircrafts
Aircraft tracking has applications in guided landing, automatic scoring in aerobatics and target tracking for military. Radar based tracking is expensive, gives away the position ...
Ajmal S. Mian
SAC
2009
ACM
14 years 2 months ago
Improving stream correlation attacks on anonymous networks
The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
Gavin O'Gorman, Stephen Blott
TCS
1998
13 years 7 months ago
TWDM Multichannel Lightwave Hypercube Networks
The hypercube is a widely used interconnection topology as it presents a lot of attractive properties. Recently, the hypercube has been proposed as a virtual topology for TWDM mul...
Peng-Jun Wan