Sciweavers

286 search results - page 30 / 58
» Authentication in the Taos Operating System
Sort
View
TES
2001
Springer
14 years 1 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
SIBGRAPI
2007
IEEE
14 years 3 months ago
Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message ex...
Hae Yong Kim, Joceli Mayer
MMSEC
2005
ACM
137views Multimedia» more  MMSEC 2005»
14 years 2 months ago
A fragile watermarking scheme for 3D meshes
In this paper, we propose a new fragile watermarking scheme for 3D meshes. Firstly, the watermark information is adaptively embedded into the mesh geometry by slightly adjusting t...
Hao-Tian Wu, Yiu-ming Cheung
ADHOC
2007
133views more  ADHOC 2007»
13 years 9 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 8 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You