Sciweavers

526 search results - page 17 / 106
» Increase honeypot security through data analysis
Sort
View
GRID
2008
Springer
14 years 9 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...
FAST
2009
14 years 7 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
ISI
2008
Springer
14 years 9 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava
CSFW
1999
IEEE
15 years 1 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
ICIP
2003
IEEE
15 years 11 months ago
Joint security & robustness enhancement for quantization embedding
This paper studies joint security and robustness enhancement of quantization based data embedding for multimedia authentication applications. We present analysis showing that thro...
M. Wu