Sciweavers

1627 search results - page 157 / 326
» High Security Smartcards
Sort
View
ACSAC
2006
IEEE
15 years 10 months ago
Anomaly Based Web Phishing Page Detection
Many anti-phishing schemes have recently been proposed in literature. Despite all those efforts, the threat of phishing attacks is not mitigated. One of the main reasons is that p...
Ying Pan, Xuhua Ding
IEEEARES
2006
IEEE
15 years 10 months ago
Modeling Dependable Systems using Hybrid Bayesian Networks
A hybrid Bayesian Network (BN) is one that incorporates both discrete and continuous nodes. In our extensive applications of BNs for system dependability assessment the models are...
Martin Neil, Manesh Tailor, Norman E. Fenton, Davi...
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
15 years 10 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
MM
2005
ACM
114views Multimedia» more  MM 2005»
15 years 10 months ago
IMAGINATION: a robust image-based CAPTCHA generation system
We propose IMAGINATION (IMAge Generation for INternet AuthenticaTION), a system for the generation of attack-resistant, user-friendly, image-based CAPTCHAs. In our system, we prod...
Ritendra Datta, Jia Li, James Ze Wang
TRUSTBUS
2005
Springer
15 years 10 months ago
Dropout-Tolerant TTP-Free Mental Poker
There is a broad literature on distributed card games over communications networks, collectively known as mental poker. Like in any distributed protocol, avoiding the need for a Tr...
Jordi Castellà-Roca, Francesc Sebé, ...