Sciweavers

360 search results - page 42 / 72
» On Protection by Layout Randomization
Sort
View
KES
2005
Springer
15 years 3 months ago
An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing
Cancelable biometrics has been proposed for canceling and re-issuing biometric templates and for protecting privacy in biometrics systems. Recently, new cancelable biometric approa...
King Hong Cheung, Adams Wai-Kin Kong, David Zhang,...
85
Voted
HOTOS
2003
IEEE
15 years 2 months ago
Secure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more freq...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
SRDS
2003
IEEE
15 years 2 months ago
SNARE: A Strong Security Scheme for Network-Attached Storage
This paper presents a strong security scheme for network-attached storage (NAS) that is based on capability and uses a key distribution scheme to keep network-attached storage fro...
Yingwu Zhu, Yiming Hu
CHES
2003
Springer
88views Cryptology» more  CHES 2003»
15 years 2 months ago
A New Algorithm for Switching from Arithmetic to Boolean Masking
To protect a cryptographic algorithm against Differential Power Analysis, a general method consists in masking all intermediate data with a random value. When a cryptographic algo...
Jean-Sébastien Coron, Alexei Tchulkine
MSE
2002
IEEE
143views Hardware» more  MSE 2002»
15 years 2 months ago
Error Resilience of EZW Coder for Image Transmission in Lossy Networks
We investigate the effect of network errors on Embedded Zerotree Wavelet (EZW) encoded images and propose modifications to the EZW coder to increase error resilience in bursty pac...
Shahab Baqai, Farhan A. Baqai, Usman Hameed, Sohai...