Sciweavers

404 search results - page 74 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
SAC
2010
ACM
15 years 4 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
ACSAC
2007
IEEE
15 years 1 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
IPPS
2009
IEEE
15 years 4 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
CIA
2004
Springer
15 years 1 months ago
Auction Equilibrium Strategies for Task Allocation in Uncertain Environments
Abstract. In this paper we address a model of self interested information agents competing to perform tasks. The agents are situated in an uncertain environment while different tas...
David Sarne, Meirav Hadad, Sarit Kraus