Sciweavers

COMPLEX
2009
Springer
14 years 6 months ago
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of zeroday malware over the Internet, generating their si...
Wei Yan, Erik Wu
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 6 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
TASE
2009
IEEE
14 years 6 months ago
Semantics of Metamodels in UML
A modelling language can be defined by a metamodel in UML class diagram. This paper defines the semantics of such metamodels through two mappings: a signature mapping from metamod...
Lijun Shan, Hong Zhu
CCS
2009
ACM
14 years 6 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
ISBI
2009
IEEE
14 years 6 months ago
Laplace-Beltrami Nodal Counts: A New Signature for 3D Shape Analysis
In this paper we develop a new approach of analyzing 3D shapes based on the eigen-system of the Laplace-Beltrami operator. While the eigenvalues of the Laplace-Beltrami operator h...
Rongjie Lai, Yonggang Shi, Ivo D. Dinov, Tony F. C...
CCS
2010
ACM
14 years 6 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...