Sciweavers

464 search results - page 38 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
DRM
2007
Springer
15 years 4 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
OOPSLA
2005
Springer
15 years 3 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
IEEEARES
2007
IEEE
15 years 4 months ago
Security vulnerabilities in DNS and DNSSEC
We present an analysis of security vulnerabilities in the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS data that is provided by name servers lacks suppor...
Suranjith Ariyapperuma, Chris J. Mitchell
ICALT
2006
IEEE
15 years 4 months ago
LIMBS: Open Source, Open Standards, and Open Content To Foster Learning Resource Exchanges
LIMBS is an open source brokerage system developed in the framework of the CALIBRATE project. LIMBS relies on open standards and open contents to promote exchanges of learning res...
Jean-Noel Colin, David Massart
ICMCS
2007
IEEE
149views Multimedia» more  ICMCS 2007»
15 years 4 months ago
SICO: A System for Detection of Near-Duplicate Images During Search
Duplicate and near-duplicate digital image matching is beneficial for image search in terms of collection management, digital content protection, and search efficiency. In this ...
Jun Jie Foo, Ranjan Sinha, Justin Zobel