Sciweavers

878 search results - page 66 / 176
» A Compiler-Based Approach to Data Security
Sort
View
176
Voted
MMSEC
2004
ACM
209views Multimedia» more  MMSEC 2004»
15 years 9 months ago
Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology t...
Emir Ganic, Ahmet M. Eskicioglu
ESORICS
2007
Springer
15 years 9 months ago
Fragmentation and Encryption to Enforce Privacy in Data Storage
Abstract. Privacy requirements have an increasing impact on the realization of modern applications. Technical considerations and many significant commercial and legal regulations ...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
131
Voted
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 3 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
133
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee
131
Voted
GEOS
2007
Springer
15 years 9 months ago
Supporting Complex Thematic, Spatial and Temporal Queries over Semantic Web Data
Spatial and temporal data are critical components in many applications. This is especially true in analytical domains such as national security and criminal investigation. Often, t...
Matthew Perry, Amit P. Sheth, Farshad Hakimpour, P...