Sciweavers

878 search results - page 166 / 176
» A Compiler-Based Approach to Data Security
Sort
View
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
14 years 1 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
14 years 1 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
AGENTS
2001
Springer
14 years 1 months ago
Adjustable autonomy in real-world multi-agent environments
Through adjustable autonomy (AA), an agent can dynamically vary the degree to which it acts autonomously, allowing it to exploit human abilities to improve its performance, but wi...
Paul Scerri, David V. Pynadath, Milind Tambe
ASPLOS
2000
ACM
14 years 27 days ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin
ICPR
2010
IEEE
14 years 26 days ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross