Sciweavers

132 search results - page 1 / 27
» Joint security
Sort
View
CCS
2004
ACM
13 years 10 months ago
Versatile padding schemes for joint signature and encryption
Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jar...
AGENTS
2000
Springer
13 years 9 months ago
Planning and learning together
This paper describes a novel algorithm for activity coordination in multiagent systems that combines joint planning and joint learning. The basic idea underlying this algorithm is...
Gerhard Weiß
ICIP
2003
IEEE
14 years 6 months ago
Joint security & robustness enhancement for quantization embedding
This paper studies joint security and robustness enhancement of quantization based data embedding for multimedia authentication applications. We present analysis showing that thro...
M. Wu
ACSAC
1999
IEEE
13 years 9 months ago
Security Architecture Development and Results for a Distributed Modeling and Simulation System
This paper reports on an ongoing effort to define the security architecture for the Joint Simulation System (JSIMS), a joint military modeling and simulation system. It also descr...
Richard B. Neely
INFOCOM
2010
IEEE
13 years 3 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...