Sciweavers

787 search results - page 96 / 158
» Subversion-Resilient Signature Schemes
Sort
View
IGARSS
2009
14 years 7 months ago
Optimum Sampling Scheme for Characterization of Mine Tailings
The paper describes a novice method for sampling geochemicals to characterize mine tailings. We model the spatial relationships between a multi-element signature and, as covariate...
Pravesh Debba, Emmanuel John M. Carranza, Alfred S...
ICIP
2001
IEEE
15 years 11 months ago
A hierarchical image authentication watermark with improved localization and security
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to imp...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
E2EMON
2006
IEEE
15 years 3 months ago
A Hybrid Approach for Accurate Application Traffic Identification
—The traffic dynamics of the Internet’s dominant applications, such as peer-to-peer and multimedia, worsen the accuracy of the existing application traffic identification. Ther...
Young J. Won, Byung-Chul Park, Hong-Taek Ju, Myung...
CCR
2007
115views more  CCR 2007»
14 years 9 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
TIP
2002
102views more  TIP 2002»
14 years 9 months ago
Hierarchical watermarking for secure image authentication with localization
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to impr...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...