๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[ACM Press the 6th ACM Symposium - Hong Kong, China (2011.03.22-2011.03.24)] Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11 - On mouse dynamics as a behavioral biometric for authentication

โœ Scribed by Jorgensen, Zach; Yu, Ting


Book ID
121399379
Publisher
ACM Press
Year
2011
Weight
105 KB
Category
Article
ISBN
1450305644

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


[ACM Press the 6th ACM Symposium - Hong
โœ Bletsch, Tyler; Jiang, Xuxian; Freeh, Vince W.; Liang, Zhenkai ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› ACM Press โš– 245 KB

Return-oriented programming is an effective code-reuse attack in which short code sequences ending in a ret instruction are found within existing binaries and executed in arbitrary order by taking control of the stack. This allows for Turing-complete behavior in the target program without the need f

[ACM Press the 6th ACM Symposium - Hong
โœ Chow, Sherman S. M.; Liu, Joseph K.; Zhou, Jianying ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› ACM Press โš– 154 KB

An identity-based online/offline encryption (IBOOE) scheme splits the encryption process into two phases. The first phase performs most of the heavy computations, such as modular exponentiation or pairing over points on elliptic curve. The knowledge of the plaintext or the receiver's identity is not