Sciweavers

2363 search results - page 346 / 473
» How Secure is RFID
Sort
View
IPPS
2006
IEEE
15 years 11 months ago
The benefits of Java and Jini in the JGrid system
The Java language and platform have been considered by many as natural candidate for creating grid systems. The platform-independent runtime environment, safe and high-level langu...
Szabolcs Pota, Zoltan Juhasz
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
15 years 11 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid
125
Voted
ICDCSW
2005
IEEE
15 years 10 months ago
Performing BGP Experiments on a Semi-realistic Internet Testbed Environment
We have built a router testbed that is connected to the Deter/Emist experimental infrastructure. Our goal is to create a semi-realistic testbed to conduct BGP experiments, measure...
Ke Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon...
IWIA
2005
IEEE
15 years 10 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
116
Voted
WECWIS
2005
IEEE
79views ECommerce» more  WECWIS 2005»
15 years 10 months ago
Enabling DRM-Preserving Digital Content Redistribution
Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the...
Srijith Krishnan Nair, Bogdan C. Popescu, Chandana...