Sciweavers

763 search results - page 93 / 153
» Digital Signatures Today
Sort
View
SACMAT
2004
ACM
15 years 10 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
MAS
1998
Springer
172views Communications» more  MAS 1998»
15 years 9 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
TIFS
2008
179views more  TIFS 2008»
15 years 5 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
140
Voted
ICIP
2010
IEEE
15 years 3 months ago
Multimedia forensic hash based on visual words
In recent years, digital images and videos have become increasingly popular over the internet and bring great social impact to a wide audience. In the meanwhile, technology advanc...
Wenjun Lu, Min Wu
OSDI
2004
ACM
16 years 5 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...