Sciweavers

859 search results - page 106 / 172
» Security for Key Management Interfaces
Sort
View
JDCTA
2008
160views more  JDCTA 2008»
13 years 10 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
MM
2005
ACM
187views Multimedia» more  MM 2005»
14 years 3 months ago
Augmented segmentation and visualization for presentation videos
We investigate methods of segmenting, visualizing, and indexing presentation videos by both audio and visual data. The audio track is segmented by speaker, and augmented with key ...
Alexander Haubold, John R. Kender
PERVASIVE
2007
Springer
14 years 4 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
OSDI
2006
ACM
14 years 10 months ago
Type-Safe Disks
We present the notion of a type-safe disk (TSD). Unlike a traditional disk system, a TSD is aware of the pointer relationships between disk blocks that are imposed by higher layer...
Gopalan Sivathanu, Swaminathan Sundararaman, Erez ...
ACSAC
2000
IEEE
14 years 2 months ago
Enabling Secure On-Line DNS Dynamic Update
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, security extensions to DNS have been p...
Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine