Sciweavers

518 search results - page 55 / 104
» Abstract Interpretation-Based Protection
Sort
View
90
Voted
GI
2004
Springer
15 years 8 months ago
User Authentication in Sensor Networks
d Abstract) Zinaida Benenson Felix G¨artner Dogan Kesdogan RWTH Aachen, Department of Computer Science, D-52056 Aachen, Germany : If the data collected within a sensor network is ...
Zinaida Benenson, Felix C. Gärtner, Dogan Kes...
PCM
2004
Springer
179views Multimedia» more  PCM 2004»
15 years 8 months ago
Digital Video Scrambling Method Using Intra Prediction Mode
Abstract. As the amount of digitalized contents increases rapidly, ‘security’ necessarily arises as one of the most important issues. The main distribution channel of digital c...
Jinhaeng Ahn, Hiuk Jae Shim, Byeungwoo Jeon, Incho...
101
Voted
PROFES
2004
Springer
15 years 8 months ago
Development of a Normative Package for Safety-Critical Software Using Formal Regulatory Requirements
Abstract. The important tasks in requirement engineering are resolving requirements inconsistencies between regulators and developers of safety-critical computer systems, and the v...
Sergiy A. Vilkomir, Aditya K. Ghose
SDMW
2004
Springer
15 years 7 months ago
Achieving Privacy Preservation when Sharing Data for Clustering
Abstract. In this paper, we address the problem of protecting the underlying attribute values when sharing data for clustering. The challenge is how to meet privacy requirements an...
Stanley R. M. Oliveira, Osmar R. Zaïane
103
Voted
SPW
2004
Springer
15 years 7 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko