Sciweavers

65 search results - page 6 / 13
» Methods for Protecting Password Transmission
Sort
View
CHI
2008
ACM
15 years 10 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
ACMSE
2006
ACM
15 years 3 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen
JSAC
2010
161views more  JSAC 2010»
14 years 4 months ago
Distortion optimal transmission of multi-layered FGS video over wireless channels
Abstract-- We identify an analytical expression for the distortion of a scalable video bitstream containing a Base Layer (BL) and one or more Enhancement Layer (EL) bitstreams. Con...
Negar Nejati, Homayoun Yousefi'zadeh, Hamid Jafark...
TIP
2010
121views more  TIP 2010»
14 years 4 months ago
Optimal PET Protection for Streaming Scalably Compressed Video Streams With Limited Retransmission Based on Incomplete Feedback
For streaming scalably compressed video streams over unreliable networks, Limited-Retransmission Priority Encoding Transmission (LR-PET) outperforms PET remarkably since the opport...
Ruiqin Xiong, David Taubman, Vijay Sivaraman
JVCIR
2006
163views more  JVCIR 2006»
14 years 9 months ago
Layered H.264 video transmission with hierarchical QAM
In multimedia communication systems, channel bandwidth and probability of error are the two main limitations that affect the quality of service. Therefore, in applications such as...
Mohammad Mahdi Ghandi, Mohammed Ghanbari