Sciweavers

5484 search results - page 933 / 1097
» Almost-Everywhere Secure Computation
Sort
View
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 10 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
VIZSEC
2005
Springer
15 years 10 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
135
Voted
ICCSA
2005
Springer
15 years 10 months ago
Mobile Mini-payment Scheme Using SMS-Credit
Mobile Phone has been widely used in the world and adopted in different application areas involved with SMS has been evolved for downloading logo, ring-tones, advertisement, secur...
Simon Fong, Edison Lai
MMSEC
2004
ACM
126views Multimedia» more  MMSEC 2004»
15 years 10 months ago
Key-dependency for a wavelet-based blind watermarking algorithm
When a host image is watermarked multiple times by the same algorithm collisions can occur. This makes it difficult for an image to host multiple watermarks. But this hosting is n...
Michael Brachtl, Andreas Uhl, Werner Dietl
PLDI
2004
ACM
15 years 10 months ago
Cost effective dynamic program slicing
Although dynamic program slicing was first introduced to aid in user level debugging, applications aimed at improving software quality, reliability, security, and performance hav...
Xiangyu Zhang, Rajiv Gupta