Sciweavers

4820 search results - page 277 / 964
» Implementing Signatures for C
Sort
View
185
Voted
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 9 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
128
Voted
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 9 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
147
Voted
PLDI
2005
ACM
15 years 9 months ago
Jungloid mining: helping to navigate the API jungle
Reuse of existing code from class libraries and frameworks is often difficult because APIs are complex and the client code required to use the APIs can be hard to write. We obser...
David Mandelin, Lin Xu, Rastislav Bodík, Do...
137
Voted
ADBIS
2005
Springer
101views Database» more  ADBIS 2005»
15 years 9 months ago
Conceptual Content Management for Software Engineering Processes
A major application area of information systems technology and multimedia content management is that of support systems for engineering processes. This includes the particularly im...
Sebastian Bossung, Hans-Werner Sehring, Michael Sk...
134
Voted
ESORICS
2005
Springer
15 years 9 months ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann