The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
In the paper we present a watermarking scheme developed to meet the specific requirements of audio annotation watermarking robust against DA/AD conversion (watermark detection aft...
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...
After the 9/11 event, terrorist attacks related to vehicles cannot be overlooked. In some critical areas, security should be concerned from the context of streets or vehicle moveme...
: In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content...