Sciweavers

796 search results - page 5 / 160
» Spoofing prevention method
Sort
View
JEI
2008
109views more  JEI 2008»
13 years 8 months ago
New approach for liveness detection in fingerprint scanners based on valley noise analysis
Recent research has shown that it is possible to spoof a variety of fingerprint scanners using some simple techniques with molds made from plastic, clay, Play-Doh, silicon, or gela...
Bozhao Tan, Stephanie A. C. Schuckers
ICMCS
2007
IEEE
106views Multimedia» more  ICMCS 2007»
14 years 4 months ago
An Investigation and a Preventing Strategy for the Redundant Packets in P2P Networks with Push Method
The push method for data transmission in peer-to-peer system has drawn great interest, since it can efficiently reduce the accumulated latency observed at user nodes. However, it ...
Xin Xiao, Yuanchun Shi, Meng Zhang
ACMSE
2004
ACM
14 years 1 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
CSE
2009
IEEE
14 years 1 months ago
A Unified Approach to Intra-domain Security
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to sec...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
COMPSYSTECH
2007
13 years 11 months ago
Computer-based plagiarism detection methods and tools: an overview
: The paper is dedicated to plagiarism problem. The ways how to reduce plagiarism: both: plagiarism prevention and plagiarism detection are discussed. Widely used plagiarism detect...
Romans Lukashenko, Vita Graudina, Janis Grundspenk...