Sciweavers

CMS
2003
120views Communications» more  CMS 2003»
13 years 6 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
CMS
2003
104views Communications» more  CMS 2003»
13 years 6 months ago
Privacy and Trust in Distributed Networks
Thomas Rössler, Arno Hollosi
CMS
2003
13 years 6 months ago
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression
David Megías, Jordi Herrera-Joancomart&iacu...
CMS
2003
148views Communications» more  CMS 2003»
13 years 6 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling
CMS
2003
101views Communications» more  CMS 2003»
13 years 6 months ago
Watermark Security via Secret Wavelet Packet Subband Structures
Abstract. Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We use the vast amount of possible wavelet packet decomposition structures to create a...
Werner Dietl, Andreas Uhl
CMS
2003
171views Communications» more  CMS 2003»
13 years 6 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
CMS
2003
108views Communications» more  CMS 2003»
13 years 6 months ago
Towards an IPv6-Based Security Framework for Distributed Storage Resources
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
Alessandro Bassi, Julien Laganier
CMS
2003
13 years 6 months ago
Operational Characteristics of an Automated Intrusion Response System
Maria Papadaki, Steven Furnell, Benn Lines, Paul L...