Sciweavers

135 search results - page 25 / 27
» Encompassing Attacks to Attacks in Abstract Argumentation Fr...
Sort
View
90
Voted
ASWEC
2008
IEEE
15 years 4 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
15 years 3 months ago
A Fingerprinting System for Musical Content
Abstract— Driven by the recent advances in digital entertainment technologies, digital multimedia content (such as music and movies) is becoming a major part of the average compu...
Lahouari Ghouti, Ahmed Bouridane, Mohammad K. Ibra...
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 3 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
76
Voted
SACRYPT
2004
Springer
143views Cryptology» more  SACRYPT 2004»
15 years 2 months ago
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
81
Voted
IH
2001
Springer
15 years 1 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu