Sciweavers

518 search results - page 29 / 104
» Abstract Interpretation-Based Protection
Sort
View
99
Voted
FC
2008
Springer
85views Cryptology» more  FC 2008»
15 years 3 months ago
Countermeasures against Government-Scale Monetary Forgery
Abstract. Physical cash is vulnerable to rising threats, such as large-scale, government-mandated forgeries, that digital cash may protect against more effectively. We study mechan...
Alessandro Acquisti, Nicolas Christin, Bryan Parno...
DGO
2004
124views Education» more  DGO 2004»
15 years 3 months ago
Data Confidentiality, Data Quality and Data Integration for Federal Databases
cipal high-level goal of the research is to develop abstractions, theory and methodology and software tools that allow federal statistical agencies to disseminate useful informatio...
Alan F. Karr
SPW
1997
Springer
15 years 6 months ago
Protocols Using Anonymous Connections: Mobile Applications
This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols ryption as primitive. This abstraction allows us t...
Michael G. Reed, Paul F. Syverson, David M. Goldsc...
ICIP
2005
IEEE
16 years 3 months ago
High capacity watermarking using balanced multiwavelet transforms
Abstract-- The emergence of digital multimedia and the proliferation of its use have raised major concerns about the protection of intellectual property. In response to these conce...
Lahouari Ghouti, Ahmed Bouridane, Said Boussakta
AIMS
2009
Springer
15 years 8 months ago
Scalable Detection and Isolation of Phishing
Abstract. This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and...
Giovane C. M. Moura, Aiko Pras