Sciweavers

15379 search results - page 75 / 3076
» Protecting users from
Sort
View
RAID
2010
Springer
13 years 5 months ago
Abusing Social Networks for Automated User Profiling
Recently, social networks such as Facebook have experienced a huge surge in popularity. The amount of personal information stored on these sites calls for appropriate security prec...
Marco Balduzzi, Christian Platzer, Thorsten Holz, ...
AHS
2006
IEEE
109views Hardware» more  AHS 2006»
14 years 1 months ago
VLSI Design IP Protection: Solutions, New Challenges, and Opportunities
It has been a decade since the need of VLSI design intellectual property (IP) protection was identified [1,2]. The goals of IP protection are 1) to enable IP providers to protect ...
Lin Yuan, Gang Qu, Lahouari Ghouti, Ahmed Bouridan...
ICMCS
2006
IEEE
104views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Protection of Video Logos with Randomization
To announce the ownership of video such as TV programs, the owner usually embeds his logo into the programs in a visible way. Since the logo and its position are usually fixed in...
Yongdong Wu
MR
2002
103views Robotics» more  MR 2002»
13 years 7 months ago
ESD protection design for CMOS RF integrated circuits using polysilicon diodes
ESD protection design for CMOS RF integrated circuits is proposed in this paper by using the stacked polysilicon diodes as the input ESD protection devices to reduce the total inp...
Ming-Dou Ker, Chyh-Yih Chang
IJWMC
2006
112views more  IJWMC 2006»
13 years 7 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...