Sciweavers

2403 search results - page 414 / 481
» Cyberinsurance in IT Security Management
Sort
View
IH
1998
Springer
14 years 10 days ago
Information Hiding to Foil the Casual Counterfeiter
Abstract. Security documents (currency, treasury bills, stocks, bonds, birth certificates, etc.) provide an interesting problem space for investigating information hiding. Recent a...
Daniel Gruhl, Walter Bender
VLDB
1998
ACM
116views Database» more  VLDB 1998»
14 years 10 days ago
The Heterogeneity Problem and Middleware Technology: Experiences with and Performance of Database Gateways
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Fernando de Ferreira Rezende, Klaudia Hergula
ISW
1997
Springer
14 years 8 days ago
Cryptanalysis of Message Authentication Codes
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery...
Bart Preneel
ICDE
1993
IEEE
147views Database» more  ICDE 1993»
14 years 7 days ago
Large Object Support in POSTGRES
This paper presents four implementations for support of large objects in POSTGRES. The four implementations offer varying levels of support for security, transactions, compression...
Michael Stonebraker, Michael A. Olson
CSREASAM
2008
13 years 9 months ago
Design of an Automatic Password Protection Mechanism for Digital Documents
- Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large ...
Shashank Kaushik, Thomas Way