Sciweavers

438 search results - page 34 / 88
» The forest hiding problem
Sort
View
SOCIALCOM
2010
14 years 6 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
DEXA
2005
Springer
93views Database» more  DEXA 2005»
15 years 5 months ago
Provable Data Privacy
In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide wheth...
Kilian Stoffel, Thomas Studer
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 4 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
IH
1998
Springer
15 years 4 months ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin
DAGSTUHL
2003
15 years 1 months ago
On Feature Orientation and on Requirements Encapsulation Using Families of Requirements
Abstract. Naive feature orientation runs into problems with large software systems, such as telephone switching systems. With naive feature orientation, a feature extends a base sy...
Jan Bredereke