Sciweavers

8503 search results - page 306 / 1701
» Secure Software Architectures
Sort
View
CRITIS
2009
15 years 6 months ago
Towards Early Warning Systems - Challenges, Technologies and Architecture
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication tec...
Martin Apel, Joachim Biskup, Ulrich Flegel, Michae...
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 11 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
TIFS
2010
128views more  TIFS 2010»
15 years 3 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....
SEUS
2005
IEEE
15 years 10 months ago
SLAP: A Location-Aware Software Infrastructure for Smart Space
In this paper, aiming at the deficiencies of Open Agent Architecture (OAA) on accommodating the location-aware computing, we propose an improved software infrastructure for Smart ...
Hongliang Gu, Yuanchun Shi, Guangyou Xu, Weisheng ...
ACSAC
1999
IEEE
15 years 9 months ago
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks
In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
Olivier Paul, Maryline Laurent, Sylvain Gombault