Sciweavers

631 search results - page 64 / 127
» Intrusion-Resilient Secure Channels
Sort
View
IH
2007
Springer
15 years 6 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quanti...
Luis Pérez-Freire, Fernando Pérez-Go...
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 5 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
IWDW
2005
Springer
15 years 5 months ago
A Survey of Watermarking Security
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Teddy Furon
ESOP
2000
Springer
15 years 3 months ago
Secure Information Flow as Typed Process Behaviour
Abstract. We propose a new type discipline for the -calculus in which secure information flow is guaranteed by static type checking. Secrecy levels are assigned to channels and are...
Kohei Honda, Vasco Thudichum Vasconcelos, Nobuko Y...
ICC
2009
IEEE
185views Communications» more  ICC 2009»
15 years 6 months ago
On the Security Performance of Physical-Layer Network Coding
—Physical-layer network coding (PLNC) is a novel wireless communication technology, in which multiple transmitters can send signals on the same channel to the same receiver at th...
Kejie Lu, Shengli Fu, Yi Qian, Tao Zhang