Sciweavers

878 search results - page 98 / 176
» A Compiler-Based Approach to Data Security
Sort
View
CCS
2004
ACM
15 years 9 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
153
Voted
ICEGOV
2007
ACM
15 years 7 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
167
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Location privacy preservation in collaborative spectrum sensing
—Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, we con...
Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Ka...
ICMCS
2006
IEEE
101views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Lightweight JPEG2000 Encryption with Anisotropic Wavelet Packets
A lightweight encryption technique for JPEG2000 with optional support for transparent encryption is proposed. Randomized anisotropic wavelet packet bases are used to construct a s...
Dominik Engel, Andreas Uhl
151
Voted
ICDCIT
2004
Springer
15 years 9 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien