Sciweavers

1391 search results - page 17 / 279
» Ensuring data integrity in storage: techniques and applicati...
Sort
View
ICDAR
2009
IEEE
14 years 9 months ago
PENTOOLS - A MATLAB Toolkit for On-line Pen-Based Data Experimentation
MATLAB provides a powerful environment for rapid prototyping of research methods and techniques. Across the wide range of on-line pen computing applications there exists a series ...
Richard M. Guest
ACSAC
2010
IEEE
14 years 9 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
OSDI
2000
ACM
15 years 1 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro
ISCC
2006
IEEE
15 years 5 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
WWW
2009
ACM
16 years 13 days ago
Large scale integration of senses for the semantic web
Nowadays, the increasing amount of semantic data available on the Web leads to a new stage in the potential of Semantic Web applications. However, it also introduces new issues du...
Jorge Gracia, Mathieu d'Aquin, Eduardo Mena