123
click to vote
ICICS
15 years 6 months ago
2003 Springer
In this paper, a digital video watermarking algorithm is proposed. We present a novel DWT-based blind digital video watermarking scheme with scrambled watermark and error correctin...
102
click to vote
ICICS
15 years 6 months ago
2003 Springer
Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. ...
126
click to vote
ICICS
15 years 6 months ago
2003 Springer
Abstract. For the application of large-scale mobile agents in a distributed environment, where a large number of computers are connected together to enable the large-scale sharing ...
127
click to vote
ICICS
15 years 6 months ago
2003 Springer
Abstract. Trust is hard to establish in a service-oriented grid architecture because of the need to support end user single sign-on and dynamic transient service. In order to enhan...
113
click to vote
ICICS
15 years 6 months ago
2003 Springer
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
|