Sciweavers

242 search results - page 41 / 49
» Practical Digital Signature Generation Using Biometrics
Sort
View
CCS
2009
ACM
14 years 8 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
BMCBI
2011
12 years 11 months ago
PI: An open-source software package for validation of the SEQUEST result and visualization of mass spectrum
Background: Tandem mass spectrometry (MS/MS) has emerged as the leading method for high- throughput protein identification in proteomics. Recent technological breakthroughs have d...
Yantao Qiao, Hong Zhang, Dongbo Bu, Shiwei Sun
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
NDSS
2007
IEEE
14 years 1 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
ICMI
2005
Springer
267views Biometrics» more  ICMI 2005»
14 years 1 months ago
XfaceEd: authoring tool for embodied conversational agents
In this paper, XfaceEd, our open source, platform independent tool for authoring 3D embodied conversational agents (ECAs) is presented. Following MPEG-4 Facial Animation (FA) stan...
Koray Balci