Sciweavers

371 search results - page 69 / 75
» Adaptation hiding modularity
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 9 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
EIS
2011
290views ECommerce» more  EIS 2011»
14 years 4 months ago
Code query by example
Most software engineering techniques that deal with software products customization are based on anticipation: The software designer has to foresee, somehow, the future needs for ...
Sebastien Vaucouleur
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
DIMVA
2009
14 years 10 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
CORR
2011
Springer
213views Education» more  CORR 2011»
14 years 4 months ago
Liquidsoap: a High-Level Programming Language for Multimedia Streaming
Generating multimedia streams, such as in a netradio, is a task which is complex and difficult to adapt to every users’ needs. We introduce a novel approach in order to achieve i...
David Baelde, Romain Beauxis, Samuel Mimram