Sciweavers

71 search results - page 5 / 15
» Hiding HSM Systems from the User
Sort
View
PET
2007
Springer
14 years 1 months ago
Nymble: Anonymous IP-Address Blocking
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 7 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
IWSEC
2007
Springer
14 years 1 months ago
GAS: Overloading a File Sharing Network as an Anonymizing System
Anonymity is considered as a valuable property as far as everyday transactions in the Internet are concerned. Users care about their privacy and they seek for new ways to keep sec...
Elias Athanasopoulos, Mema Roussopoulos, Kostas G....
CA
2003
IEEE
14 years 21 days ago
ElasticPaint: A Particle System for Feature Mapping with Minimum Distortion
Mapping of features such as texture and geometric detail is an important tool that enhances realism of surface geometry in graphics and animation. This essentially involves a tran...
Christopher Carner, Hong Qin
TAPSOFT
1991
Springer
13 years 11 months ago
A Calculus of Broadcasting Systems
Abstract. CBS is a simple and natural CCS-like calculus where processes speak one at a time and are heard instantaneously by all others. Speech is autonomous, contention between sp...
K. V. S. Prasad