Sciweavers

569 search results - page 88 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
ICDE
2008
IEEE
232views Database» more  ICDE 2008»
16 years 1 months ago
Continuous Content-Based Copy Detection over Streaming Videos
Digital videos are increasingly adopted in various multimedia applications where they are usually broadcasted or transmitted as video streams. Continuously monitoring copies on the...
Ying Yan, Beng Chin Ooi, Aoying Zhou
OPODIS
2008
15 years 1 months ago
Byzantine Consensus with Unknown Participants
Abstract. Consensus is a fundamental building block used to solve many practical problems that appear on reliable distributed systems. In spite of the fact that consensus is being ...
Eduardo Adílio Pelinson Alchieri, Alysson N...
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
15 years 5 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
14 years 10 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle
SEKE
2010
Springer
14 years 10 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li