Sciweavers

617 search results - page 100 / 124
» Research Challenges for the Security of Control Systems
Sort
View
DGO
2009
175views Education» more  DGO 2009»
13 years 10 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...
AVBPA
2003
Springer
152views Biometrics» more  AVBPA 2003»
14 years 2 months ago
The BANCA Database and Evaluation Protocol
In this paper we describe the acquistion and content of a new large, realistic and challenging multi-modal database intended for training and testing multi-modal verification syst...
Enrique Bailly-Bailliére, Samy Bengio, Fr&e...
ICIP
2010
IEEE
13 years 7 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...
FAST
2009
13 years 7 months ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger
SAC
2010
ACM
13 years 9 months ago
Improving the efficiency of dynamic malware analysis
Each day, security companies see themselves confronted with thousands of new malware programs. To cope with these large quantities, researchers and practitioners alike have develo...
Ulrich Bayer, Engin Kirda, Christopher Kruegel