Sciweavers

26 search results - page 1 / 6
» On Invertible Sampling and Adaptive Security
Sort
View
ASIACRYPT
2010
Springer
13 years 3 months ago
On Invertible Sampling and Adaptive Security
Yuval Ishai, Abishek Kumarasubramanian, Claudio Or...
PVLDB
2008
138views more  PVLDB 2008»
13 years 4 months ago
Authenticating the query results of text search engines
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time...
HweeHwa Pang, Kyriakos Mouratidis
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
13 years 11 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui
IJIT
2004
13 years 6 months ago
A Lossless Watermarking Based Authentication System For Medical Images
In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to frag...
Samia Boucherkha, Mohamed Benmohamed
IPPS
2007
IEEE
13 years 11 months ago
Biomolecular Path Sampling Enabled by Processing in Network Storage
Computationally complex and data intensive atomic scale biomolecular simulation is enabled via Processing in Network Storage (PINS): a novel distributed system framework to overco...
Paul Brenner, Justin M. Wozniak, Douglas Thain, Aa...