Sciweavers

1757 search results - page 221 / 352
» Secure Content Validation
Sort
View
WWW
2005
ACM
16 years 3 days ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
15 years 12 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
ADBIS
2009
Springer
144views Database» more  ADBIS 2009»
15 years 6 months ago
Learning Support and Legally Ruled Collaboration in the VirtualLife Virtual World Platform
The paper addresses the purposes and design decisions produced while developing a peer-to-peer virtual world platform. The work is being done within the FP7 VirtualLife project. Th...
Vytautas Cyras, Kristina Lapin
IFIP
2009
Springer
15 years 6 months ago
Detecting Spam at the Network Level
Spam is increasingly a core problem affecting network security and performance. Indeed, it has been estimated that 80% of all email messages are spam. Content-based filters are a ...
Anna Sperotto, Gert Vliek, Ramin Sadre, Aiko Pras
IFIP
2009
Springer
15 years 6 months ago
Enhancing Progressive Encryption for Scalable Video Streams
The technique called progressive encryption is used in many areas of content security. However, the plain algorithm itself is only applicable in real transmission scenarios where n...
Viktor Gergely, Gábor Fehér