Sciweavers

1190 search results - page 218 / 238
» Secure off-the-record messaging
Sort
View
112
Voted
IJIT
2004
15 years 2 months ago
A Lossless Watermarking Based Authentication System For Medical Images
In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to frag...
Samia Boucherkha, Mohamed Benmohamed
124
Voted
DBSEC
2003
157views Database» more  DBSEC 2003»
15 years 2 months ago
Systematic Development of a Family of Fair Exchange Protocols
: Fair exchange protocols play an important role in application areas such as e-commerce where protocol participants require mutual guarantees that a transaction involving exchange...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
ISSA
2004
15 years 2 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
86
Voted
USENIX
2001
15 years 2 months ago
Sandboxing Applications
Users frequently have to choose between functionality and security. When running popular Web browsers or email clients, they frequently find themselves turning off features such a...
Vassilis Prevelakis, Diomidis Spinellis
92
Voted
AI
2008
Springer
15 years 25 days ago
Robust artificial life via artificial programmed death
We propose a novel approach to self-regenerating continuously-operating systems. Such systems provide best-case solutions in security surveillance or decision making centers. We i...
M. M. Olsen, N. Siegelmann-Danieli, Hava T. Siegel...