Sciweavers

268 search results - page 34 / 54
» An Analysis of Bitstate Hashing
Sort
View
EUROPAR
2007
Springer
14 years 3 months ago
Securing Sensor Reports in Wireless Sensor Networks*
Abstract. The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and ...
Al-Sakib Khan Pathan, Choong Seon Hong
ISPA
2007
Springer
14 years 3 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong
ICICS
2005
Springer
14 years 2 months ago
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
Abstract. Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may ...
Tieyan Li, Huafei Zhu, Yongdong Wu
MSR
2010
ACM
14 years 2 months ago
Finding file clones in FreeBSD Ports Collection
Abstract—In Open Source System (OSS) development, software components are often imported and reused; for this reason we might expect that files are copied in multiple projects (...
Yusuke Sasaki, Tetsuo Yamamoto, Yasuhiro Hayase, K...
IEEEMSP
2002
IEEE
156views Multimedia» more  IEEEMSP 2002»
14 years 2 months ago
A robust and secure media signature scheme for JPEG images
—In [1, 2, 3], we have introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correctio...
Qibin Sun, Qi Tian, Shih-Fu Chang