Sciweavers

948 search results - page 71 / 190
» Making a Game of Network Security
Sort
View
SUTC
2008
IEEE
15 years 4 months ago
On the Security of the Full-Band Image Watermark for Copyright Protection
Digital watermarks have been embedded invisibly in digital media to protect copy rights of legal owners. The embedded watermarks can be extracted to indicate ownership originals. ...
Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han
DSN
2008
IEEE
15 years 4 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
ICDIM
2007
IEEE
15 years 4 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel
OPODIS
2007
14 years 11 months ago
Worm Versus Alert: Who Wins in a Battle for Control of a Large-Scale Network?
Consider the following game between a worm and an alert3 over a network of n nodes. Initially, no nodes are infected or alerted and each node in the network is a special detector n...
James Aspnes, Navin Rustagi, Jared Saia
IC
2010
14 years 7 months ago
Distributed Algorithms for the Placement of Network Services
Network services play an important role in the Internet today. They serve as data caches for websites, servers for multiplayer games and relay nodes for Voice over IP (VoIP) conver...
Todd Sproull, Roger Chamberlain