Sciweavers

18374 search results - page 58 / 3675
» Applications for data hiding
Sort
View
ICPP
2003
IEEE
14 years 3 months ago
Running Bag-of-Tasks Applications on Computational Grids: The MyGrid Approach
e some simple working environment abstractions that hide the configuration heterogeneity of the machines that compose the grid from the user. Second, we introduce Work Queue with R...
Walfredo Cirne, Daniel Paranhos da Silva, Lauro Co...
AINA
2006
IEEE
14 years 3 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi
AAAI
1990
13 years 10 months ago
Tree Decomposition with Applications to Constraint Processing
This paper concerns the task of removing redundant information from a given knowledge base, and restructuring it in the form of a tree, so as to admit efficient problem solving ro...
Itay Meiri, Judea Pearl, Rina Dechter
SSWMC
2004
13 years 11 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
USENIX
2003
13 years 11 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...