Sciweavers

5722 search results - page 532 / 1145
» Security Function Interactions
Sort
View
ERCIMDL
2007
Springer
111views Education» more  ERCIMDL 2007»
15 years 11 months ago
Using Watermarks and Offline DRM to Protect Digital Images in DIAS
The Digital Image Archiving System (DIAS) is an image management system, the major functions of which are preserving valuable digital images and serving as an image provider for ex...
Hsin-Yu Chen, Hsiang-An Wang, Chin-Lung Lin
138
Voted
NEW2AN
2007
Springer
15 years 11 months ago
Communications Challenges in the Celtic-BOSS Project
The BOSS project [1] aims at developing an innovative and bandwidth efficient communication system to transmit large data rate communications between public transport vehicles and ...
Gábor Jeney, Catherine Lamy-Bergot, Xavier ...
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
15 years 11 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup
132
Voted
ISVLSI
2006
IEEE
114views VLSI» more  ISVLSI 2006»
15 years 11 months ago
A Low Power Lookup Technique for Multi-Hashing Network Applications
Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail ...
Ilhan Kaya, Taskin Koçak
ISPEC
2005
Springer
15 years 10 months ago
A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications
Abstract. Access control is a system-wide concern that has both a generic nature and an application dependent characteristic. It is generic as many functions must be protected with...
Kung Chen, Chih-Mao Huang