Sciweavers

786 search results - page 133 / 158
» A Software System for Secure Computer Aided Exams
Sort
View
134
Voted
SACMAT
2009
ACM
15 years 10 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
CASES
2010
ACM
15 years 1 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
GIS
2008
ACM
15 years 4 months ago
Combining 3-D geovisualization with force feedback driven user interaction
We describe a prototype software system for investigating novel human-computer interaction techniques for 3-D geospatial data. This system, M4-Geo (Multi-Modal Mesh Manipulation o...
Adam Faeth, Michael Oren, Chris Harding
144
Voted
MMSEC
2005
ACM
274views Multimedia» more  MMSEC 2005»
15 years 9 months ago
LSB steganalysis based on high-order statistics
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
Sorina Dumitrescu, Xiaolin Wu
DRM
2005
Springer
15 years 9 months ago
Statistical audio watermarking algorithm based on perceptual analysis
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the pe...
Xiaomei Quan, Hongbin Zhang