Sciweavers

2601 search results - page 265 / 521
» Secure Rewarding Schemes
Sort
View
BROADNETS
2004
IEEE
15 years 7 months ago
Efficient QoS Provisioning for Adaptive Multimedia in Mobile Communication Networks by Reinforcement Learning
The scarcity and large fluctuations of link bandwidth in wireless networks have motivated the development of adaptive multimedia services in mobile communication networks, where i...
Fei Yu, Vincent W. S. Wong, Victor C. M. Leung
DMKD
2003
ACM
108views Data Mining» more  DMKD 2003»
15 years 9 months ago
Dynamic inference control
An inference problem exists in a multilevel database if knowledge of some objects in the database allows information with a higher security level to be inferred. Many such inferen...
Jessica Staddon
ESORICS
2009
Springer
15 years 7 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
CCS
2008
ACM
15 years 5 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
JCP
2007
122views more  JCP 2007»
15 years 3 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta