Sciweavers

2386 search results - page 3 / 478
» Database Security 2000
Sort
View
96
Voted
SIGKDD
2000
109views more  SIGKDD 2000»
15 years 2 months ago
Report on WebDB'2000: 3rd International Workshop on the Web and Databases
Dan Suciu, Gottfried Vossen
126
Voted
NAR
2000
104views more  NAR 2000»
15 years 2 months ago
Transcription Regulatory Regions Database (TRRD): its status in 2000
Transcription Regulatory Regions Database (TRRD) has been developed for accumulation of experimental information on the structure
Nikolay A. Kolchanov, Olga A. Podkolodnaya, Elena ...
172
Voted
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 8 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
120
Voted
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 9 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
133
Voted
IC
2000
15 years 4 months ago
IRBAC 2000: Secure Interoperability Using Dynamic Role Translation
Apu Kapadia, Jalal Al-Muhtadi, Roy H. Campbell, M....