Sciweavers

1081 search results - page 125 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View

Book
688views
17 years 2 months ago
Database Management Systems
A set of presentations covering the book, which includes the following topics ER Model and Conceptual Design, The Relational Model and SQL DDL, Relational Algebra, SQL, Database Ap...
Raghu Ramakrishnan, Johannes Gehrke
BIOSIG
2003
117views Biometrics» more  BIOSIG 2003»
15 years 5 months ago
Comparative Study on Fingerprint Recognition Systems - Project BioFinger
: This paper describes a comparative study on fingerprint recognition systems – the project BioFinger. The goal of this study is to investigate the capability characteristics of ...
Michael Arnold, Henning Daum, Christoph Busch
IWSEC
2009
Springer
15 years 11 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
CCS
2009
ACM
15 years 8 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
MOBIDE
2009
ACM
15 years 11 months ago
Toward context and preference-aware location-based services
The explosive growth of location-detection devices, wireless communications, and mobile databases has resulted in the realization of location-based services as commercial products...
Mohamed F. Mokbel, Justin J. Levandoski