Sciweavers

1116 search results - page 84 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
115
Voted
LCN
2007
IEEE
15 years 7 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
88
Voted
SIP
2007
15 years 2 months ago
Mosaic-based figure-ground segmentation along with static segmentation by mean shift
This work deals with the problem of backgroundforeground segmentation in video scenes. We propose an approach that makes use of feature extraction and matching, robust estimation,...
J. Sole, Yu Huang, Joan Llach
MTA
2007
82views more  MTA 2007»
15 years 4 days ago
A scalable signature scheme for video authentication
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharin...
Pradeep K. Atrey, Wei-Qi Yan, Mohan S. Kankanhalli
94
Voted
IJCIS
2006
80views more  IJCIS 2006»
15 years 19 days ago
A Layered Framework for Connecting Client Objectives and Resource Capabilities
entifies three levels of abstraction for resource requirements a service provider needs to manage, detailed specification of raw resources, virtualization of heterogeneous resource...
Asit Dan, Kavitha Ranganathan, Catalin Dumitrescu,...
109
Voted
IFIP
2010
Springer
14 years 7 months ago
Efficient Decision Procedures for Message Deducibility and Static Equivalence
Abstract. We consider two standard notions in formal security protocol analysis: message deducibility and static equivalence under equational theories. We present polynomial-time a...
Bruno Conchinha, David A. Basin, Carlos Caleiro