Sciweavers

511 search results - page 50 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
EUROCRYPT
2010
Springer
15 years 8 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
MM
2010
ACM
215views Multimedia» more  MM 2010»
15 years 4 months ago
Sirio, orione and pan: an integrated web system for ontology-based video search and annotation
In this technical demonstration we show an integrated web system for video search and annotation based on ontologies. The system is composed by three components: the Orione1 ontol...
Marco Bertini, Gianpaolo D'Amico, Andrea Ferracani...
NSPW
2003
ACM
15 years 9 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
WPES
2003
ACM
15 years 9 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
IJIT
2004
15 years 5 months ago
A Lossless Watermarking Based Authentication System For Medical Images
In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to frag...
Samia Boucherkha, Mohamed Benmohamed