Sciweavers

878 search results - page 99 / 176
» A Compiler-Based Approach to Data Security
Sort
View
118
Voted
ICMCS
2000
IEEE
206views Multimedia» more  ICMCS 2000»
15 years 8 months ago
Audio Watermarking: Features, Applications, and Algorithms
This paper considers desired properties and possible applications of audio watermarking algorithms. Special attention is given to statistical methods working in the fourier domain...
Michael Arnold
249
Voted
AMW
2011
14 years 7 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
SIGCOMM
2012
ACM
13 years 6 months ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
160
Voted
TIT
2010
130views Education» more  TIT 2010»
14 years 10 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar
104
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
A Declarative Control Language for Dependable XML Message Queues
We present a novel approach for the implementation of efficient and dependable web service engines (WSEs). A WSE instance represents a single node in a distributed network of par...
Alexander Böhm 0002, Carl-Christian Kanne, Gu...