Sciweavers

1166 search results - page 131 / 234
» Adaptively Secure Broadcast
Sort
View
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 6 months ago
Perfect NIZK with Adaptive Soundness
Abstract. This paper presents a very simple and efficient adaptivelysound perfect NIZK argument system for any NP-language. In contrast to recently proposed schemes by Groth, Ostro...
Masayuki Abe, Serge Fehr
ISM
2006
IEEE
104views Multimedia» more  ISM 2006»
15 years 6 months ago
A Novel Invisible Color Image Watermarking Scheme Using Image Adaptive Watermark Creation and Robust Insertion-Extraction
In this paper we present a robust and novel strategic invisible approach for insertion-extraction of a digital watermark, a color image, into color images. The novelty of our sche...
Saraju P. Mohanty, Parthasarathy Guturu, Elias Kou...
86
Voted
LCN
2006
IEEE
15 years 6 months ago
Flexible Flow Aggregation for Adaptive Network Monitoring
Network monitoring is a major building block for many domains in communication networks. Besides typical accounting mechanisms and the emerging area of charging in next generation...
Falko Dressler, Gerhard Münz
97
Voted
AAAI
2000
15 years 2 months ago
Adaptive User Interfaces through Dynamic Design Automation
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....
104
Voted
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 26 days ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin