Sciweavers

2270 search results - page 438 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
146
Voted
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
15 years 1 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
138
Voted
CVPR
2011
IEEE
14 years 7 months ago
Activity Recognition using Dynamic Subspace Angles
Cameras are ubiquitous everywhere and hold the promise of significantly changing the way we live and interact with our environment. Human activity recognition is central to under...
Octavia Camps, Mario Sznaier, Binlong Li, Teresa M...
148
Voted
ICONFERENCE
2012
13 years 11 months ago
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
Blase Ur, Yang Wang
168
Voted
CSFW
2002
IEEE
15 years 8 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
140
Voted
WWW
2008
ACM
16 years 4 months ago
Supporting anonymous location queries in mobile environments with privacygrid
This paper presents PrivacyGrid - a framework for supporting anonymous location-based queries in mobile information delivery systems. The PrivacyGrid framework offers three unique...
Bhuvan Bamba, Ling Liu, Péter Pesti, Ting W...