Sciweavers

5882 search results - page 1143 / 1177
» networks 2010
Sort
View
SOUPS
2010
ACM
14 years 22 days ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
14 years 22 days ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
SP
2010
IEEE
327views Security Privacy» more  SP 2010»
14 years 22 days ago
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
– With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split...
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang
ICDCS
2010
IEEE
14 years 15 days ago
When Transportation Meets Communication: V2P over VANETs
Abstract—Information interaction is a crucial part of modern transportation activities. In this paper, we propose the idea of Vehicle-to-Passenger communication (V2P), which allo...
Nianbo Liu, Ming Liu, Jiannong Cao, Guihai Chen, W...
GECCO
2010
Springer
158views Optimization» more  GECCO 2010»
14 years 5 days ago
Efficiently evolving programs through the search for novelty
A significant challenge in genetic programming is premature convergence to local optima, which often prevents evolution from solving problems. This paper introduces to genetic pro...
Joel Lehman, Kenneth O. Stanley
« Prev « First page 1143 / 1177 Last » Next »