Sciweavers

12478 search results - page 292 / 2496
» Secure Interaction Design
Sort
View
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
P2P
2003
IEEE
157views Communications» more  P2P 2003»
15 years 10 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 11 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
EUROCRYPT
2004
Springer
15 years 10 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
DIGRA
2005
Springer
15 years 10 months ago
Interactive Digital Storytelling: Towards a Hybrid Conceptual Approach
In this contribution, “Interactive Digital Storytelling” is viewed as a hybrid form of game design and cinematic storytelling for the understanding and creation of future lear...
Ulrike Spierling