Sciweavers

476 search results - page 23 / 96
» A New Attack against Khazad
Sort
View
ACSC
2003
IEEE
14 years 3 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
ESORICS
2012
Springer
12 years 7 days ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...
ICIP
2009
IEEE
13 years 7 months ago
Blind and robust mesh watermarking using manifold harmonics
In this paper, we present a new blind and robust 3-D mesh watermarking scheme that makes use of the recently proposed manifold harmonics analysis. The mesh spectrum coefficient am...
Kai Wang, Ming Luo, Adrian G. Bors, Florence Denis
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
14 years 4 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
ISW
1999
Springer
14 years 2 months ago
Digital Watermarking Robust Against JPEG Compression
Digital watermarking has been considered as an important technique to protect the copyright of digital content. For a digital watermarking method to be effective, it is essential ...
Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng