Sciweavers

1757 search results - page 1 / 352
» Secure Content Validation
Sort
View
ICDE
2007
IEEE
124views Database» more  ICDE 2007»
13 years 11 months ago
Secure Content Validation
Information dissemination in electronic form has improved drastically over the past few years. New technologies in web feeds allow the uses to get notified automatically when new...
Mummoorthy Murugesan, Wei Jiang
PAM
2007
Springer
13 years 11 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
13 years 11 months ago
Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks
— This paper presents a new notion of authenticating degraded multimedia content streamed over wireless networks – Unequal Authenticity Protection (UAP). Multimedia content dif...
Zhi Li, Qibin Sun, Yong Lian
EUROPKI
2008
Springer
13 years 6 months ago
Validation Algorithms for a Secure Internet Routing PKI
David J. Montana, Mark Reynolds