Sciweavers

74 search results - page 12 / 15
» Cross-Site Framing Attacks
Sort
View
IEEEARES
2008
IEEE
14 years 5 months ago
Quantitative Assessment of Enterprise Security System
—In this paper we extend a model-based approach to security management with concepts and methods that provide a possibility for quantitative assessments. For this purpose we intr...
Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Y...
P2P
2008
IEEE
14 years 5 months ago
Transaction Rate Limiters for Peer-to-Peer Systems
We introduce transaction rate limiters, new mechanisms that limit (probabilistically) the maximum number of transactions a user of a peer-to-peer system can do in any given period...
Marcos Kawazoe Aguilera, Mark Lillibridge, Xiaozho...
ICICS
2003
Springer
14 years 4 months ago
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code
In this paper, a digital video watermarking algorithm is proposed. We present a novel DWT-based blind digital video watermarking scheme with scrambled watermark and error correctin...
Pat Pik-Wah Chan, Michael R. Lyu
ISCIS
2003
Springer
14 years 4 months ago
A Video Watermarking Algorithm Based on the Human Visual System Properties
Abstract. In this paper, we propose a new video watermarking algorithm based on the human visual system (HVS) properties to find effective locations in video sequences for robust ...
Ji-Young Moon, Yo-Sung Ho
HOTOS
1997
IEEE
14 years 3 months ago
Building Diverse Computer Systems
Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advan...
Stephanie Forrest, Anil Somayaji, David H. Ackley