Sciweavers

Share
CMS
2006
9 years 10 months ago
Selective Encryption for Hierarchical MPEG
Selective encryption of visual data and especially MPEG has attracted a considerable number of researchers in recent years. Scalable visual formats are offering additional function...
Heinz Hofbauer, Thomas Stütz, Andreas Uhl
CMS
2006
116views Communications» more  CMS 2006»
9 years 10 months ago
A Fair Anonymous Submission and Review System
Reputation systems play an important role in many Internet communities. They allow individuals to estimate other individual's behavior during interactions. However, a more pri...
Vincent Naessens, Liesje Demuynck, Bart De Decker
CMS
2006
164views Communications» more  CMS 2006»
9 years 10 months ago
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains
In this paper we describe how we have added support for dynamic delegation of authority that is enacted via the issuing of credentials from one user to another, to the XACML model ...
David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen
CMS
2006
158views Communications» more  CMS 2006»
9 years 10 months ago
On the Privacy Risks of Publishing Anonymized IP Network Traces
Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of p...
D. Koukis, Spyros Antonatos, Kostas G. Anagnostaki...
CMS
2006
9 years 10 months ago
Perturbing and Protecting a Traceable Block Cipher
At the Asiacrypt 2003 conference Billet and Gilbert introduce a block cipher, which, to quote them, has the following paradoxical traceability properties: it is computationally ea...
Julien Bringer, Hervé Chabanne, Emmanuelle ...
CMS
2006
175views Communications» more  CMS 2006»
9 years 10 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
CMS
2006
170views Communications» more  CMS 2006»
9 years 10 months ago
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart
Abstract. Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA) is a
Elias Athanasopoulos, Spyros Antonatos
CMS
2006
110views Communications» more  CMS 2006»
9 years 10 months ago
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
Giannakis Antoniou, Campbell Wilson, Dimitris Gene...
CMS
2006
9 years 10 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
CMS
2006
150views Communications» more  CMS 2006»
9 years 10 months ago
Attribute Delegation Based on Ontologies and Context Information
This paper presents a model for delegation based on partial orders, proposing the subclass relation in OWL as a way to represent the partial orders. Delegation and authorization de...
Isaac Agudo, Javier Lopez, José A. Monteneg...
books