Sciweavers

242 search results - page 30 / 49
» Practical Digital Signature Generation Using Biometrics
Sort
View
MOBISYS
2008
ACM
14 years 7 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
ICISC
2000
102views Cryptology» more  ICISC 2000»
13 years 9 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson
IWC
2007
134views more  IWC 2007»
13 years 7 months ago
Disrupting digital library development with scenario informed design
In recent years, there has been great interest in scenario-based design and other forms of user-centred design. However, there are many design processes that, often for good reaso...
Ann Blandford, Suzette Keith, Richard Butterworth,...
IFIP
2001
Springer
14 years 2 days ago
Random Adjacent Sequences: An Efficient Solution for Logic BIST
: High defect coverage requires good coverage of different fault types. In this paper, we present a comprehensive test vector generation technique for BIST, called Random Single In...
René David, Patrick Girard, Christian Landr...
IFIP
2005
Springer
14 years 1 months ago
Content-Based Image Retrieval for Digital Forensics
Digital forensic investigators are often faced with the task of manually examining a large number of (photographic) images in order to identify potential evidence. The task can be...
Yixin Chen, Vassil Roussev, Golden G. Richard III,...