Sciweavers

121 search results - page 18 / 25
» Data Assurance in Opaque Computations
Sort
View
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 4 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
MM
2009
ACM
249views Multimedia» more  MM 2009»
15 years 4 months ago
MyFinder: near-duplicate detection for large image collections
The explosive growth of multimedia data poses serious challenges to data storage, management and search. Efficient near-duplicate detection is one of the required technologies for...
Xin Yang, Qiang Zhu, Kwang-Ting Cheng
TCSV
2010
14 years 6 months ago
Cross-Layer Packet Retry Limit Adaptation for Video Transport Over Wireless LANs
Video transport over wireless networks requires retransmissions to successfully deliver video data to a receiver in case of packet loss, leading to increased delay time for the dat...
Chih-Ming Chen, Chia-Wen Lin, Yung-Chang Chen
CCS
2004
ACM
15 years 5 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
DSOM
2003
Springer
15 years 4 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung