Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 21-30 of 50 total results
[1201.0397] Hiding Malicious Content in PDF Documents
Abstract: This paper is a proof-of-concept demonstration for a specific digital signatures vulnerability that shows the ineffectiveness of the WYSIWYS (What You See Is What You Sign) concept. The algorithm is fairly simple: the attacker generates a polymorphic file that has two different types of content (text, as a PDF document for example, and image: TIFF - two of the most widely used file ...
https://arxiv.org/abs/1201.0397
Average Rating (0 votes)
 Smart Cards Applications in the Healthcare System
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 63 reader. The computer runs a software application with which the doctor saves patient information in to the smartcard. Reading or writing the smartcard is made securely, because each time for accessing
Marius Popa - Google Scholar Citations
Journal of Mobile, Embedded and Distributed Systems 4 (4), 233 - 248, 2012. 14: 2012: Quality Metrics of Citizen Oriented Informatics Applications. M Popa, I Ivan, D Palaghită, B Vintilă ...
AASCIT - Journal -Reviewers
L. Militaru, G. Suciu, G. Todoran “The Use of Automated Software Tools in Evaluating an e-Learning Platform Quality”. “Journal of Mobile, Embedded and Distributed Systems - JMEDS”, Vol. 4, No. 3, 2012 (online), pp. 150-158 4.
www.aascit.org/membership/georgesuciu
Average Rating (0 votes)
An Approach to Mobile Multimedia Digital Rights Management ...
Toma, C., Boja, C.: Survey of Mobile Digital Rights Management Platforms. Journal of Mobile, Embedded and Distributed Systems 1(1), 32–42 (2009) Google Scholar
Android based Cost-Efficient AI Attendance System – IJERT
Facial Recognition using OpenCV, Journal of Mobile, Embedded and Distributed Systems(JMEDS),2014. Cristianini, N. and Shawe-Taylor, An Introduction to Support Vector Machines, Cambridge University Press,2000.
Projects – ISM – IT&C Security Master – Informatics ...
Journal of Mobile, Embedded and Distributed Systems. Scientific / Tech. Handbook. Information Security Handbook. Scientific. Maskitto Light WordPress Theme by Shufflehound. Content copyrights 2015 IT&C Security Master ism@ase.ro (+40) 021 319 19 00 / int 331. Home; About . Aims and Objectives ...
ism.ase.ro/?page_id=101
Average Rating (0 votes)
About the Conference | The 19th International Conference ...
The International Conference on INFORMATICS in ECONOMY (IE), Education, Research & Business Technologies, is held every year since 1993 in Bucharest, Romania.The Conference promotes research results in Business Informatics and related Computer Science topics: Cloud, Distributed and Parallel Computing, Mobile-Embedded and Multimedia Solutions, E-Society, Enterprise and Business Solutions ...
Real-Time Face Detection and Recognition in Complex Background
Georgescu, D. (2011) A Real-Time Face Recognition System Using Eigenfaces. Journal of Mobile, Embedded and Distributed Systems, 3, 193-204. Li, Z., Lin, D. and Tang, X. (2009) Nonparametric Discriminant Analysis for Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31, 755-761.
Concurrency Control Techniques | Distributed Computing ...
Journal of Mobile, Embedded and Distributed Systems (JMEDS) Dining Philosopher Problem. Uploaded by. Shikhar Gupta. multicore. Uploaded by. Muhammad Omar Farooq. OCPJP Threads. Uploaded by. Priya Arun. Distributed DBMS. Uploaded by. UsmanAhmed. The a to Z of DB2. Uploaded by. Nett2k. Blockchain Fundamentals.
1 2 3 4 5
Pages
|