Sciweavers

319 search results - page 43 / 64
» Controlled Secret Leakage
Sort
View
VLDB
2003
ACM
156views Database» more  VLDB 2003»
14 years 8 months ago
Watermarking relational data: framework, algorithms and analysis
We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and de...
Rakesh Agrawal, Peter J. Haas, Jerry Kiernan
IPPS
2009
IEEE
14 years 2 months ago
Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks
In P2P file sharing systems, free-riders who use others’ resources without sharing their own cause system-wide performance degradation. Existing techniques to counter freerider...
Kyuyong Shin, Douglas S. Reeves, Injong Rhee
MOBISYS
2011
ACM
12 years 10 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
SMC
2007
IEEE
113views Control Systems» more  SMC 2007»
14 years 2 months ago
Evaluation and implement of fuzzy vault scheme using indexed minutiae
— Juels et. al proposed a fuzzy vault scheme that extracts secret from inexact biometric information. However, typical feature extracted from fingerprint, called minutiae, is as...
Hiroaki Kikuchi, Yasunori Onuki, Kei Nagai
CRYPTO
1992
Springer
168views Cryptology» more  CRYPTO 1992»
14 years 1 days ago
Threshold Schemes with Disenrollment
Blakley, Blakley, Chan and Massey conjectured a lower bound on the entropy of broadcast messages in threshold schemes with disenrollment. In an effort to examine the conjecture, w...
Bob Blakley, G. R. Blakley, Agnes Hui Chan, James ...