Sciweavers

1875 search results - page 232 / 375
» Modeling the Security of Steganographic Systems
Sort
View
SAC
2006
ACM
15 years 6 months ago
BTS: a Byzantine fault-tolerant tuple space
Generative coordination is one of the most prominent coordination models for implementing open systems due to its spatial and temporal decoupling. Recently, a coordination communi...
Alysson Neves Bessani, Joni da Silva Fraga, Lau Ch...
118
Voted
DBSEC
2006
122views Database» more  DBSEC 2006»
15 years 1 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
ICIAR
2005
Springer
15 years 6 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
DANCE
2002
IEEE
15 years 5 months ago
Active Network Vision and Reality: Lessons from a Capsule-Based System
Although active networks have generated much debate in the research community, on the whole there has been little hard evidence to inform this debate. This paper aims to redress t...
David Wetherall
FC
1997
Springer
107views Cryptology» more  FC 1997»
15 years 4 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko