Sciweavers

2386 search results - page 337 / 478
» Database Security 2000
Sort
View
ICMCS
2000
IEEE
145views Multimedia» more  ICMCS 2000»
15 years 7 months ago
Staganalysis of LSB Encoding in Color Images
In this paper, we analyze the security of Least Significant Bit (LSB) embedding for hiding messages in high-color-depth digital images. We introduce a powerful steganalytic techni...
Jiri Fridrich, Rui Du, Meng Long
IPPS
2000
IEEE
15 years 7 months ago
A Requirements Analysis for Parallel KDD Systems
Abstract. The current generation of data mining tools have limited capacity and performance, since these tools tend to be sequential. This paper explores a migration path out of th...
William Maniatty, Mohammed Javeed Zaki
NDSS
2000
IEEE
15 years 7 months ago
Analysis of a Fair Exchange Protocol
We analyze an optimistic contract signing protocol of Asokan, Shoup, and Waidner as a case study in the applicability of formal methods to verification of fair exchange protocols...
Vitaly Shmatikov, John C. Mitchell
NDSS
2000
IEEE
15 years 7 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
TOOLS
2000
IEEE
15 years 7 months ago
Customization of Component-Based Object Request Brokers through Dynamic Reconfiguration
The success of distributed object technology, depends on the advent of Object Request Broker (ORB) architectures that are able to integrate flexible support for various nonfunctio...
Bo Nørregaard Jørgensen, Eddy Truyen...