Sciweavers

1627 search results - page 256 / 326
» High Security Smartcards
Sort
View
97
Voted
KBSE
2008
IEEE
15 years 10 months ago
Testing Peers' Volatility
—Peer-to-peer (P2P) is becoming a key technology for software development, but still lacks integrated solutions to build trust in the final software, in terms of correctness and...
Eduardo Cunha de Almeida, Gerson Sunyé, Yve...
152
Voted
NDSS
2008
IEEE
15 years 10 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
158
Voted
WACV
2008
IEEE
15 years 10 months ago
Iris Extraction Based on Intensity Gradient and Texture Difference
Biometrics has become more and more important in security applications. In comparison with many other biometric features, iris recognition has very high recognition accuracy. Succ...
Guodong Guo, Michael J. Jones
143
Voted
WCNC
2008
IEEE
15 years 10 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
120
Voted
CGO
2007
IEEE
15 years 10 months ago
Evaluating Indirect Branch Handling Mechanisms in Software Dynamic Translation Systems
Software Dynamic Translation (SDT) systems are used for program instrumentation, dynamic optimization, security, intrusion detection, and many other uses. As noted by many researc...
Jason Hiser, Daniel Williams, Wei Hu, Jack W. Davi...