Sciweavers

15379 search results - page 183 / 3076
» Protecting users from
Sort
View
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
15 years 4 months ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu
79
Voted
APSCC
2008
IEEE
15 years 28 days ago
Measuring the Effectiveness and the Fairness of Relation Hiding Systems
In this paper, we develop a framework for measuring the level of protection offered by relation hiding systems. The framework provides a uniform way to define a variety of privacy ...
Andreas Pashalidis
104
Voted
MMS
2008
14 years 11 months ago
On error-correcting fingerprinting codes for use with watermarking
Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal c...
Hans Georg Schaathun
ICC
2009
IEEE
113views Communications» more  ICC 2009»
14 years 8 months ago
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic
When employing cryptographic tunnels such as the ones provided by Secure Shell (SSH) to protect their privacy on the Internet, users expect two forms of protection. First, they aim...
Maurizio Dusi, Alice Este, Francesco Gringoli, Luc...
IEEEARES
2009
IEEE
15 years 5 months ago
Generating User-Understandable Privacy Preferences
—Making use of the World Wide Web’s numerous services increasingly requires the disclosure of personal user data. While these data represent an important value for service prov...
Jan Kolter, Günther Pernul