Sciweavers

1466 search results - page 20 / 294
» Completeness of the Authentication Tests
Sort
View
ICIP
2001
IEEE
14 years 9 months ago
A hierarchical image authentication watermark with improved localization and security
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to imp...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
ACSAC
2007
IEEE
14 years 2 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
IJNSEC
2008
69views more  IJNSEC 2008»
13 years 7 months ago
Proof of Forward Security for Password-based Authenticated Key Exchange
Recently, M. Abdalla et al. proposed a slightly different variant of AuthA, based on the scheme proposed by E. Bresson et al., and provided the first complete proof of forward-sec...
Shuhua Wu, Yuefei Zhu
TIP
2002
102views more  TIP 2002»
13 years 7 months ago
Hierarchical watermarking for secure image authentication with localization
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to impr...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
SIGMOD
2006
ACM
127views Database» more  SIGMOD 2006»
14 years 7 months ago
Query evaluation using overlapping views: completeness and efficiency
We study the problem of finding efficient equivalent viewbased rewritings of relational queries, focusing on query optimization using materialized views under the assumption that ...
Gang Gou, Maxim Kormilitsin, Rada Chirkova