Sciweavers

74 search results - page 13 / 15
» Cross-Site Framing Attacks
Sort
View
SIVP
2010
197views more  SIVP 2010»
13 years 8 months ago
Video watermarking using wavelet transform and tensor algebra
We present a robust, hybrid non-blind MPEG video watermarking technique based on a high-order tensor singular value decomposition and the discrete wavelet transform (DWT). The core...
Emad E. Abdallah, A. Ben Hamza, Prabir Bhattachary...
IH
2009
Springer
14 years 4 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...
ICN
2005
Springer
14 years 3 months ago
Securing Layer 2 in Local Area Networks
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...
WISEC
2009
ACM
14 years 4 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
CCS
2007
ACM
14 years 4 months ago
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism
Browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. Achieving proper isolations, however, is very difficult. Historical data show that even fo...
Shuo Chen, David Ross, Yi-Min Wang