Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode val...
Automatic age estimation from facial images has aroused research interests in recent years due to its promising potential for some computer vision applications. Among the methods ...
We consider an architecture for a serverless distributed file system that does not assume mutual trust among the client computers. The system provides security, availability, and ...
William J. Bolosky, John R. Douceur, David Ely, Ma...
— Agent ownership is a difficult task that touches legal domain. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent’s act...
Salvatore Vitabile, Giovanni Pilato, Vincenzo Cont...