Sciweavers

920 search results - page 130 / 184
» Selecting Secure Passwords
Sort
View
GECCO
2009
Springer
191views Optimization» more  GECCO 2009»
14 years 3 months ago
Evolvable malware
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we use this concept in the domain of virology to ev...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
OOPSLA
2009
Springer
14 years 3 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
IEEEARES
2008
IEEE
14 years 3 months ago
Performance Analysis of Anonymous Communication Channels Provided by Tor
— Providing anonymity for end-users on the Internet is a very challenging and difficult task. There are currently only a few systems that are of practical relevance for the prov...
Andriy Panchenko, Lexi Pimenidis, Johannes Renner
ICMCS
2007
IEEE
118views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Cascading Multimodal Verification using Face, Voice and Iris Information
In this paper we propose a novel fusion strategy which fuses information from multiple physical traits via a cascading verification process. In the proposed system users are veri...
Ping-Han Lee, Lu-Jong Chu, Yi-Ping Hung, Sheng-Wen...
ICMCS
2007
IEEE
175views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Clicker - An IPTV Remote Control in Your Cell Phone
This paper investigates a novel concept of providing seamless control and portability of an IPTV viewing session. A solution employing a middleware system, a secure hardware token...
Rittwik Jana, Yih-Farn Chen, David C. Gibbon, Yenn...