Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Elena Gabriela Barrantes"'
Publikováno v:
2021 Ethics and Explainability for Responsible Data Science (EE-RDS).
Publikováno v:
2019 IV Jornadas Costarricenses de Investigación en Computación e Informática (JoCICI).
— Domestic IoT devices have been registering extremely high adoption rates as new generations increase their purchasing power and the promises of value expressed by the manufacturers of these devices are becoming increasingly attractive and necessa
Publikováno v:
2018 7th International Conference On Software Process Improvement (CIMPS).
The increasing publication of large amounts of data, theoretically anonymous, can lead to a number of attacks on the privacy of people. The publication of sensitive data without exposing the data owners is generally not part of the software developer
Publikováno v:
Information
Volume 9
Issue 7
Information, Vol 9, Iss 7, p 160 (2018)
Volume 9
Issue 7
Information, Vol 9, Iss 7, p 160 (2018)
Nowadays, there is a high necessity to create new and robust cryptosystems. Dynamical systems have promised to develop crypto-systems due to the close relationship between them and the cryptographic requirements. Distributed dynamic encryption (DDE)
Publikováno v:
CLEI
Code injection attacks are an undeniable threat in today's cyberworld. Instruction Set Randomization (ISR) was initially proposed in 2003. This technique was designed to protect systems against code injection attacks by creating an unique instruction
Publikováno v:
Privacy and Identity Management. Facing up to Next Steps ISBN: 9783319557823
Privacy and Identity Management
Privacy and Identity Management
In this paper we propose a hybrid privacy-protection model for the Internet of Things (IoT) with the ultimate purpose of balancing privacy restrictions and usability in data delivery services. Our model uses traditional de-identification methods (suc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e03639297cb4b347bba2a08b1af13d43
https://doi.org/10.1007/978-3-319-55783-0_14
https://doi.org/10.1007/978-3-319-55783-0_14
Publikováno v:
ACM Transactions on Information and System Security. 8:3-40
Injecting binary code into a running program is a common form of attack. Most defenses employ a “guard the doors” approach, blocking known mechanisms of code injection. Randomized instruction set emulation (RISE) is a complementary method of defe
Publikováno v:
CLEI Electronic Journal, Vol 11, Iss 2 (2008)
In recent times a dramatically decreasing tendency in female participation in Computer Science has been documented around the world. When this occurs, it creates a series of problems that must be addressed. For the case of the undergraduate and gradu
Publikováno v:
CLEI Electronic Journal, Vol 11, Iss 2 (2008)
Low participation of women in Computer Science (CS) has been documented in some countries. Since this phenomenon occurs in the Computer Science and Informatics Department at the Universidad de Costa Rica, we decided to investigate if there were gende
Autor:
Elena Gabriela Barrantes, Y. Weiss
Publikováno v:
ACSAC
Instruction set randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is randomized instruction set emulator (RISE), based on the open-source Valgrind I