Sciweavers

2237 search results - page 56 / 448
» On the Security of Random Sources
Sort
View
ICASSP
2009
IEEE
15 years 4 months ago
Secure image retrieval through feature protection
This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focus...
Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, M...
ISITA
2010
14 years 4 months ago
Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source
We consider the Binary Erasure Source (BES) introduced by Martinian and Yedidia. Based on the technique introduced by Martinian and Wainwright, we upper bound the rate-distortion p...
Gregory Demay, Vishwambhar Rathi, Lars K. Rasmusse...
ATAL
2008
Springer
14 years 11 months ago
Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Janusz Marecki, Fernando ...
JOC
2007
129views more  JOC 2007»
14 years 9 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
ITCC
2005
IEEE
15 years 3 months ago
The GSI Plug-in for gSOAP: Enhanced Security, Performance, and Reliability
In this paper we report on the current status of the GSI plug-in for gSOAP, an open source solution to the problem of securing web services in grid environments.
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, D...