Sciweavers

71 search results - page 6 / 15
» Hiding HSM Systems from the User
Sort
View
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 28 days ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...
CCS
2011
ACM
12 years 7 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
ER
2000
Springer
105views Database» more  ER 2000»
13 years 11 months ago
TBE: Trigger-By-Example
One of the obstacles that hinder database trigger systems from their wide deployment is the lack of tools that aid users in creating trigger rules. Similar to understanding and spe...
Dongwon Lee, Wenlei Mao, Wesley W. Chu
BMCBI
2004
102views more  BMCBI 2004»
13 years 7 months ago
FRAGS: estimation of coding sequence substitution rates from fragmentary data
Background: Rates of substitution in protein-coding sequences can provide important insights into evolutionary processes that are of biomedical and theoretical interest. Increased...
Estienne C. Swart, Winston A. Hide, Cathal Seoighe
NDSS
2009
IEEE
14 years 2 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee