Sciweavers

1183 search results - page 127 / 237
» On flow-sensitive security types
Sort
View
IWDW
2004
Springer
15 years 10 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
15 years 9 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
UIALL
2004
Springer
15 years 9 months ago
A New Visualization Concept for Navigation Systems
At present, various types of car navigation systems are progressively entering the market. Simultaneously, mobile outdoor navigation systems for pedestrians and electronic tourist ...
Wolfgang Narzt, Gustav Pomberger, Alois Ferscha, D...
JCDL
2003
ACM
103views Education» more  JCDL 2003»
15 years 9 months ago
SCENS: A System for the Mediated Sharing of Sensitive Data
1 This paper introduces SCENS, a Secure Content Exchange Negotiation System suitable for the exchange of private digital data that reside in distributed digital repositories. SCENS...
Song Ye, Fillia Makedon, Tilmann Steinberg, Li She...
AGENTS
2001
Springer
15 years 9 months ago
Implementing soft real-time agent control
Real-time control has become increasingly important as technologies are moved from the lab into real world situations. The complexity associated with these systems increases as co...
Régis Vincent, Bryan Horling, Victor R. Les...