Sciweavers

6137 search results - page 182 / 1228
» Securing Collaborative Applications
Sort
View
ITCC
2002
IEEE
14 years 3 months ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
FGR
2004
IEEE
97views Biometrics» more  FGR 2004»
14 years 2 months ago
Recognizing Song-Based Blink Patterns: Applications for Restricted and Universal Access
We introduce a novel system for recognizing patterns of eye blinks for use in assistive technology interfaces and security systems. First, we present a blink-based interface for c...
Tracy L. Westeyn, Thad Starner
JNCA
2006
86views more  JNCA 2006»
13 years 10 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
13 years 5 months ago
Left invertibility of output-quantized systems: An application to cryptography
ABSTRACT. In this paper a secure communication method is proposed, based on left invertibility of output-quantized dynamical systems. The sender uses an output-quantized linear sys...
Nevio Dubbini, Anna Carluccio, Antonio Bicchi
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
14 years 3 months ago
Designing and Examining PC to Palm Collaboration
One trend in day-to-day computing involves moving seamlessly from large powerful workstations to small handheld devices. A second trend is continuous collaboration with colleagues...
Ivan Marsic, Allan Meng Krebs, Bogdan Dorohonceanu...