Sciweavers

591 search results - page 43 / 119
» Securing the Broker Pattern
Sort
View
IH
1999
Springer
14 years 1 months ago
Attacks on Steganographic Systems
The majority of steganographic utilities for the camouflage of confidential communication suffers from fundamental weaknesses. On the way to more secure steganographic algorithm...
Andreas Westfeld, Andreas Pfitzmann
MVA
2002
144views Computer Vision» more  MVA 2002»
13 years 9 months ago
Fingerprint Identification Using the Accidental Coincidence Probability
A method of comparing and identifying two patterns is proposed based on the accidental coincidence probability of the patterns' features. The probability is calculated under ...
Akira Monden, Seiji Yoshimoto
EUROSYS
2007
ACM
14 years 6 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
ETRICS
2006
14 years 1 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
HAIS
2009
Springer
14 years 2 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...