Sciweavers

518 search results - page 52 / 104
» Abstract Interpretation-Based Protection
Sort
View
110
Voted
SG
2007
Springer
15 years 8 months ago
Data-Embeddable Texture Synthesis
Abstract. Data hiding techniques onto images provide tools for protecting copyright or sending secret messages, and they are currently utilized as a simple input device of a cell p...
Hirofumi Otori, Shigeru Kuriyama
163
Voted
TRUSTBUS
2007
Springer
15 years 8 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
110
Voted
INFOCOM
2005
IEEE
15 years 8 months ago
Exploiting diversity to enhance multimedia streaming over cellular links
Abstract— Wireless Wide Area Networks (WWANs) are becoming ubiquitous across most geographic regions, enabling simultaneous coverage from multiple providers. WWAN channels exhibi...
Julian Chesterfield, Rajiv Chakravorty, Ian Pratt,...
ACISP
2005
Springer
15 years 8 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
129
Voted
AVBPA
2005
Springer
288views Biometrics» more  AVBPA 2005»
15 years 8 months ago
Addressing the Vulnerabilities of Likelihood-Ratio-Based Face Verification
Abstract. Anti-spoofing protection of biometric systems is always a serious issue in real-life applications of an automatic personal verification system. Despite the fact that face...
Krzysztof Kryszczuk, Andrzej Drygajlo