Sciweavers

94 search results - page 3 / 19
» Attacks on Copyright Marking Systems
Sort
View
ICDE
2005
IEEE
167views Database» more  ICDE 2005»
14 years 7 months ago
Privacy and Ownership Preserving of Outsourced Medical Data
The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing o...
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Rober...
SMC
2007
IEEE
14 years 23 hour ago
Improved collusion-secure codes for digital fingerprinting based on finite geometries
Abstract— Digital fingerprinting, a copyright protection technique for digital contents, is considered. Digital fingerprinting should deter collusion attacks, where several fi...
Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hiras...
CCS
2006
ACM
13 years 9 months ago
Measuring the attack surfaces of two FTP daemons
Software consumers often need to choose between different software that provide the same functionality. Today, security is a quality that many consumers, especially system adminis...
Pratyusa K. Manadhata, Jeannette M. Wing, Mark Fly...
ACSC
2003
IEEE
13 years 11 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
CCS
2006
ACM
13 years 9 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen