Oral Session 10: Countermeasures

نویسندگان

  • A. P. Mulavara
  • M. J. Fiedler
  • I. Kofman
  • B. Peters
  • S. J. Wood
  • J. M. Serrador
  • H. Cohen
  • M. F. Reschke
  • J. J. Bloomberg
چکیده

K.I. Buytaert, H.G. MacDougall, P.-F. Migeotte, N. Pattyn, G. Clement, S.T. Moore, P.H. Van de Heyning and F.L. Wuyts Antwerp University Research centre for Equilibrium and Aerospace (AUREA), ENT Department, Antwerp University Hospital, University of Antwerp, Wilrijkstraat 10, 2650, Edegem, Belgium. E-mail: kristof. [email protected] Department of Psychology, University of Sydney, Sydney, NSW, Australia Signal and Image Centre, Electrical Engineering Department, Royal Military Academy, Brussels, Belgium Faculty of Medicine, University of Toulouse, Toulouse, France Mount Sinai School of Medicine, New York, USA

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Issues and Countermeasure for VoIP

........................................................................................................... 4 Document Conventions................................................................................... 4 Introduction.................................................................................................... 5 Overview of VoIP techniques..........................................

متن کامل

ASVspoof 2015: Automatic Speaker Verification Spoofing and Countermeasures Challenge Evaluation Plan

The ASVspoof initiative follows on from the first special session in spoofing and countermeasures for automatic speaker verification (ASV) held during the 2013 edition of INTERSPEECH in Lyon, France [1]. The vision behind that first edition was to promote the consideration of spoofing, to encourage the development of anti-spoofing countermeasures and to gather a community to design, collect and...

متن کامل

Wireless Security: Vulnerabilities and Countermeasures

The panel session will cover current issues and problems in wireless security and approaches to dealing with them.

متن کامل

9th ISCA Workshop on Speech Synthesis

s 10 Keynote Session 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Oral Session 1: Prosody. . . . . . . . . . . . . . . . . . . . . . . . . 12 Poster Session 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Keynote Session 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Oral Session 2: Deep Learning in Speech Synthesis . . . . . . . . . 25 Demo Session . . . ...

متن کامل

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates

Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms—if decoupled from SSL/TLS session establishment—are vulnerable to man-in-the-middle attacks. In this article, we examine the feasibility of such attacks, survey countermeasures, and explain the rationale behind SSL/TLS session-aware user authentication as a lightweight an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011