Abstract. Information sharing on distributed collaboration usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure mann...
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
Which agent architectures are capable of justifying descriptions in terms of the `higher level' mental concepts applicable to human beings? We propose a new kind of architect...
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...