Sciweavers

770 search results - page 126 / 154
» Privacy Preserving Joins
Sort
View
ICPR
2010
IEEE
14 years 9 months ago
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding
In this article, a new fragile, blind, high payload capacity, ROI (Region of Interest) preserving Medical image watermarking (MIW) technique in the spatial domain for grayscale med...
Malay Kumar Kundu, Sudeb Das
COMSUR
2011
218views Hardware» more  COMSUR 2011»
13 years 11 months ago
A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)
Abstract—Exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol (SIP) has proven difficult. The challenge is to effectively exchange keys w...
Vijay K. Gurbani, Vladimir Kolesnikov
BMCBI
2004
96views more  BMCBI 2004»
14 years 11 months ago
A hybrid clustering approach to recognition of protein families in 114 microbial genomes
Background: Grouping proteins into sequence-based clusters is a fundamental step in many bioinformatic analyses (e.g., homology-based prediction of structure or function). Standar...
Timothy J. Harlow, J. Peter Gogarten, Mark A. Raga...
GIS
2008
ACM
16 years 26 days ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi
ESORICS
2002
Springer
15 years 11 months ago
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones
Network based intrusions have become a serious threat to the users of the Internet. Intruders who wish to attack computers attached to the Internet frequently conceal their identit...
Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu