Sciweavers

18374 search results - page 32 / 3675
» Applications for data hiding
Sort
View
USENIX
1994
13 years 9 months ago
SNP: An Interface for Secure Network Programming
SNP provides a high-level abstraction for secure end-toend network communications. It supports both stream and datagram semantics with security guarantees (e.g., data originauthen...
Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su...
ISW
2007
Springer
14 years 1 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
POPL
2004
ACM
14 years 8 months ago
Separation and information hiding
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resource...
Peter W. O'Hearn, Hongseok Yang, John C. Reynolds
ICDM
2003
IEEE
98views Data Mining» more  ICDM 2003»
14 years 28 days ago
On the Privacy Preserving Properties of Random Data Perturbation Techniques
Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving data mining techniques. A large...
Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamo...
GISCIENCE
2004
Springer
121views GIS» more  GISCIENCE 2004»
14 years 1 months ago
Semi-automatic Ontology Alignment for Geospatial Data Integration
In geospatial applications with heterogeneous databases, an ontology-driven approach to data integration relies on the alignment of the concepts of a global ontology that describe ...
Isabel F. Cruz, William Sunna, Anjli Chaudhry