Sciweavers

15379 search results - page 384 / 3076
» Protecting users from
Sort
View
ISW
2005
Springer
15 years 9 months ago
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
Hongxia Jin, Ginger Myles, Jeffery Lotspiech
CCS
2004
ACM
15 years 9 months ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
DISCEX
2003
IEEE
15 years 9 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
15 years 9 months ago
Too Much to Carry? Copyright Laws in the Electronic Environment
Digitization of information, the rise of the World Wide Web, and the development of new means for information creation, production and dissemination place new strains on the legal...
Terrence A. Maxwell
ACMIDC
2009
15 years 8 months ago
Petimo: safe social networking robot for children
"Petimo" is an interactive robotic toy designed to protect children from potential risks in social networks and the virtual world and helps them to make a safely connect...
Adrian David Cheok, Owen Noel Newton Fernando, Cha...