Sciweavers

739 search results - page 79 / 148
» Information Flow in Credential Systems
Sort
View
SECON
2008
IEEE
14 years 2 months ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
FGR
1998
IEEE
203views Biometrics» more  FGR 1998»
14 years 1 days ago
Automated Facial Expression Recognition Based on FACS Action Units
Automated recognition of facial expression is an important addition to computer vision research because of its relevance to the study of psychological phenomena and the developmen...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
13 years 9 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
IPPS
1999
IEEE
14 years 2 days ago
Tailor-Made Operating Systems for Embedded Parallel Applications
This paper presents the Pure/Epos approach to deal with the high complexity of adaptable operating systems and also to diminish the distance between application and operating syste...
Antônio Augusto Fröhlich, Wolfgang Schr...