Sciweavers

557 search results - page 14 / 112
» Two experiences designing for effective security
Sort
View
ACSW
2006
13 years 10 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
ECCV
2004
Springer
14 years 10 months ago
Camera Calibration with Two Arbitrary Coplanar Circles
Abstract. In this paper, we describe a novel camera calibration method to estimate the extrinsic parameters and the focal length of a camera by using only one single image of two c...
Qian Chen, Haiyuan Wu, Toshikazu Wada
FPT
2005
IEEE
98views Hardware» more  FPT 2005»
14 years 2 months ago
Secure Partial Reconfiguration of FPGAs
SRAM FPGAs are vulnerable to security breaches such as bitstream cloning, reverse-engineering, and tampering. Bitstream encryption and authentication are two most effective and pr...
Amir Sheikh Zeineddini, Kris Gaj
ICSE
2003
IEEE-ACM
14 years 8 months ago
Sound Methods and Effective Tools for Engineering Modeling and Analysis
Modeling and analysis is indispensable in engineering. To be safe and effective, a modeling method requires a language with a validated semantics; feature-rich, easy-to-use, depen...
David Coppit, Kevin J. Sullivan
ICIS
1997
13 years 10 months ago
The effects of task interruption and information presentation on individual decision making
Interrupted work environments are commonplace in today’s organizations. In addition, organizational work is increasingly performed using some form of computer support. Consequen...
Cheri Speier, Joseph S. Valacich, Iris Vessey