Sciweavers

24529 search results - page 52 / 4906
» Computing on Authenticated Data
Sort
View
DBSEC
2000
111views Database» more  DBSEC 2000»
13 years 11 months ago
Authentic Third-party Data Publication
Premkumar T. Devanbu, Michael Gertz, Charles U. Ma...
CRYPTO
2011
Springer
176views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
Mihir Bellare, Sriram Keelveedhi
DBSEC
2003
137views Database» more  DBSEC 2003»
13 years 11 months ago
Certifying Data from Multiple Sources
Abstract Data integrity can be problematic when integrating and organizing information from many sources. In this paper we describe efficient mechanisms that enable a group of data...
Glen Nuckolls, Charles U. Martel, Stuart G. Stubbl...
TIFS
2010
82views more  TIFS 2010»
13 years 8 months ago
Lossless data embedding in electronic inks
—This paper presents a novel lossless data embedding algorithm for electronic inks. The proposed algorithm first computes the analytical ink-curve for each stroke as a set of sm...
Hong Cao, Alex C. Kot

Publication
270views
12 years 8 months ago
A Data Hiding Scheme Based on LBPROT Pattern
Texture classification is mainly used for segmentation of texture regions and content-based access to image databases. Lately these texture classification patterns have been appl...
E. E. Varsaki, V. Fotopoulos, A. N. Skodras