Sciweavers

Share
CMS
2003
101views Communications» more  CMS 2003»
9 years 7 months ago
Watermark Security via Secret Wavelet Packet Subband Structures
Abstract. Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We use the vast amount of possible wavelet packet decomposition structures to create a...
Werner Dietl, Andreas Uhl
CMS
2003
171views Communications» more  CMS 2003»
9 years 7 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
CMS
2003
108views Communications» more  CMS 2003»
9 years 7 months ago
Towards an IPv6-Based Security Framework for Distributed Storage Resources
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
Alessandro Bassi, Julien Laganier
CMS
2003
9 years 7 months ago
Operational Characteristics of an Automated Intrusion Response System
Maria Papadaki, Steven Furnell, Benn Lines, Paul L...
CMS
2001
133views Communications» more  CMS 2001»
9 years 7 months ago
Asynchronous Large-Scale Certification Based on Certificate Verification Trees
Good public-key infrastructures (PKIs) are essential to make electronic commerce secure. Quite recently, certificate verification trees (CVTs) have been introduced as a tool for im...
M. Mar Albà, Josep Domingo-Ferrer, Francesc...
CMS
2001
119views Communications» more  CMS 2001»
9 years 7 months ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...
CMS
2006
9 years 7 months ago
Selective Encryption for Hierarchical MPEG
Selective encryption of visual data and especially MPEG has attracted a considerable number of researchers in recent years. Scalable visual formats are offering additional function...
Heinz Hofbauer, Thomas Stütz, Andreas Uhl
CMS
2006
116views Communications» more  CMS 2006»
9 years 7 months ago
A Fair Anonymous Submission and Review System
Reputation systems play an important role in many Internet communities. They allow individuals to estimate other individual's behavior during interactions. However, a more pri...
Vincent Naessens, Liesje Demuynck, Bart De Decker
books