Sciweavers

15379 search results - page 216 / 3076
» Protecting users from
Sort
View
FDTC
2007
Springer
124views Cryptology» more  FDTC 2007»
14 years 2 months ago
Countermeasures against Branch Target Buffer Attacks
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm. In this p...
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi,...
ISORC
2000
IEEE
14 years 15 days ago
Experimentation in CPU Control with Real-Time Java
This paper describes experiences in using an O.O. language (Java) in designing, prototyping and evaluating a CPU manager. QoS Animator facilitates the execution of object oriented...
Gerasimos Xydas, Jerome Tassel
MBUI
2004
133views User Interface» more  MBUI 2004»
13 years 9 months ago
From Models to Interactive Systems Tool Support and XIML
user interface application model dialogue model Design Design Transformation by patterns Transformation by patterns class diagram task model l use model b.-object model device mod...
Peter Forbrig, Anke Dittmar, Daniel Reichart, Dani...
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
ACSAC
2010
IEEE
13 years 5 months ago
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularit...
Zi Chu, Steven Gianvecchio, Haining Wang, Sushil J...