Sciweavers

518 search results - page 32 / 104
» Abstract Interpretation-Based Protection
Sort
View
ACISP
2003
Springer
15 years 7 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon
CONCUR
1999
Springer
15 years 6 months ago
Validating Firewalls in Mobile Ambients
Abstract. The ambient calculus is a calculus of computation that allows active processes (mobile ambients) to move between sites. A firewall is said to be protective whenever it d...
Flemming Nielson, Hanne Riis Nielson, René ...
ISW
2000
Springer
15 years 5 months ago
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling
Abstract. Two robust spatial-domain watermarking algorithms for image copyright protection are described in this paper. The first one is robust against compression, filtering and c...
Francesc Sebé, Josep Domingo-Ferrer, Jordi ...
111
Voted
IFIP11
2004
110views Business» more  IFIP11 2004»
15 years 3 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
WCE
2007
15 years 3 months ago
A Brief Survey on RFID Privacy and Security
Abstract— In this survey we take a look at different approaches proposed in the literature for addressing the privacy and security issues derived from the Radio-Frequency IDenti...
J. Aragones-Vilella, Antoni Martínez-Balles...