Sciweavers

569 search results - page 75 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
92
Voted
TIFS
2008
179views more  TIFS 2008»
14 years 11 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
WS
2003
ACM
15 years 5 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
ICIP
2008
IEEE
15 years 6 months ago
A novel video encryption technique based on secret sharing
The rapid growth of the Internet and digitized content made video distribution simpler. Hence the need for video data protection is on the rise. In this paper, we propose a secure...
Chigullapally Narsimha Raju, Ganugula Umadevi, Kan...
PODS
2007
ACM
119views Database» more  PODS 2007»
15 years 12 months ago
Reasoning about XML update constraints
XML and semi-structured data are now de-facto standards for data exchange, and it is often the case that published or exchanged XML documents have specic restrictions on how they ...
Bogdan Cautis, Serge Abiteboul, Tova Milo
CIA
2003
Springer
15 years 5 months ago
Trust Networks on the Semantic Web
The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, ce...
Jennifer Golbeck, Bijan Parsia, James A. Hendler