Sciweavers

2904 search results - page 395 / 581
» Internet Infrastructure Security
Sort
View
ICISS
2005
Springer
15 years 9 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
IWDW
2004
Springer
15 years 9 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz
PCM
2004
Springer
179views Multimedia» more  PCM 2004»
15 years 9 months ago
Digital Video Scrambling Method Using Intra Prediction Mode
Abstract. As the amount of digitalized contents increases rapidly, ‘security’ necessarily arises as one of the most important issues. The main distribution channel of digital c...
Jinhaeng Ahn, Hiuk Jae Shim, Byeungwoo Jeon, Incho...
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 9 months ago
Handling Identity in Peer-to-Peer Systems
Due to the limited number of available IP addresses most computers on the Internet use dynamic IP addresses which causes problems for applications that have to maintain routing ta...
Manfred Hauswirth, Anwitaman Datta, Karl Aberer
OOPSLA
2001
Springer
15 years 8 months ago
Modular Mixin-Based Inheritance for Application Frameworks
Mixin modules are proposed as an extension of a class-based programming language. Mixin modules combine parallel extension of classes, including extension of the self types for th...
Dominic Duggan, Ching-Ching Techaubol