Sciweavers

53 search results - page 6 / 11
» Risk Analysis for Inter-organizational Controls
Sort
View
INFORMATICALT
2010
99views more  INFORMATICALT 2010»
13 years 6 months ago
Analysis of Thermovisual Data of the Radio-Frequency Impact on the Myocardium Damage
In this article, a method is proposed for analysing the thermovision-based video data that characterize the dynamics of temperature anisotropy of the heart tissue in a spatial doma...
Vincentas Veikutis, Gintautas Dzemyda, Povilas Tre...
SASO
2009
IEEE
14 years 2 months ago
Swarming Geographic Event Profiling, Link Analysis, and Prediction
Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...
Sven A. Brueckner
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
14 years 1 months ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
ICIAR
2010
Springer
14 years 10 days ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
13 years 11 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...