Sciweavers

787 search results - page 146 / 158
» Subversion-Resilient Signature Schemes
Sort
View
EUROPKI
2007
Springer
15 years 3 months ago
E-Passports as a Means Towards the First World-Wide Public Key Infrastructure
Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless communication capability, as well as with a s...
Dimitrios Lekkas, Dimitris Gritzalis
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
15 years 3 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
ACSAC
2005
IEEE
15 years 3 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
SACMAT
2004
ACM
15 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
OOPSLA
2004
Springer
15 years 3 months ago
Super and inner: together at last!
In an object-oriented language, a derived class may declare a method with the same signature as a method in the base class. The meaning of the re-declaration depends on the langua...
David S. Goldberg, Robert Bruce Findler, Matthew F...