Sciweavers

1186 search results - page 13 / 238
» A New Approach to Secure Logging
Sort
View
CORR
2011
Springer
203views Education» more  CORR 2011»
13 years 6 days ago
Comparing Haar-Hilbert and Log-Gabor Based Iris Encoders on Bath Iris Image Database
This papers introduces a new family of iris encoders which use 2-dimensional Haar Wavelet Transform for noise attenuation, and Hilbert Transform to encode the iris texture. In orde...
Nicolaie Popescu-Bodorin, Valentina E. Balas
NSPW
2004
ACM
14 years 1 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 18 days ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
MMS
2007
13 years 8 months ago
New approaches to encryption and steganography for digital videos
In this work we propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. We also present an ex...
Daniel Socek, Hari Kalva, Spyros S. Magliveras, Og...
ACSC
2002
IEEE
14 years 1 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered