Sciweavers

40 search results - page 7 / 8
» Secure and Low Cost Selective Encryption for JPEG2000
Sort
View
ICCD
2000
IEEE
107views Hardware» more  ICCD 2000»
14 years 2 months ago
Architectural Impact of Secure Socket Layer on Internet Servers
Secure socket layer SSL is the most popular protocol used in the Internet for facilitating secure communications through authentication, encryption, and decryption. Although the...
Krishna Kant, Ravishankar K. Iyer, Prasant Mohapat...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
13 years 11 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
SPLC
2010
13 years 3 months ago
Stratified Analytic Hierarchy Process: Prioritization and Selection of Software Features
Product line engineering allows for the rapid development of variants of a domain specific application by using a common set of reusable assets often known as core assets. Variabil...
Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Sam...
FC
2000
Springer
150views Cryptology» more  FC 2000»
13 years 8 months ago
Self-Scrambling Anonymizers
For the two last decades, people have tried to provide practical electronic cash schemes, with more or less success. Indeed, the most secure ones generally suffer from inefficiency...
David Pointcheval
SPEECH
2011
13 years 4 days ago
Discrimination of speech from nonspeeech in broadcast news based on modulation frequency features
We describe a content based speech discrimination algorithm in broadcast news based on the time-varying information provided by the modulation spectrum. Due to the varying degrees...
Maria E. Markaki, Yannis Stylianou