Sciweavers

591 search results - page 97 / 119
» Securing the Broker Pattern
Sort
View
WPES
2003
ACM
14 years 1 months ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...
CIARP
2003
Springer
14 years 1 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
PASTE
2010
ACM
14 years 1 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
ICIAR
2010
Springer
14 years 1 months ago
Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords?
Graphical passwords have been proposed as an alternative to alphanumeric passwords with their advantages in usability and security. However, they still tend to follow predictable p...
Haichang Gao, Xiuling Chang, Zhongjie Ren, Uwe Aic...
ICS
2010
Tsinghua U.
14 years 1 months ago
Small-ruleset regular expression matching on GPGPUs: quantitative performance analysis and optimization
We explore the intersection between an emerging class of architectures and a prominent workload: GPGPUs (General-Purpose Graphics Processing Units) and regular expression matching...
Jamin Naghmouchi, Daniele Paolo Scarpazza, Mladen ...