Sciweavers

2340 search results - page 49 / 468
» Data abstraction and information hiding
Sort
View
MEDIAFORENSICS
2010
13 years 8 months ago
On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unid...
Félix Balado
ESORICS
2009
Springer
14 years 10 months ago
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries
Authenticated dictionaries allow users to send lookup requests to an untrusted server and get authenticated answers. Persistent authenticated dictionaries (PADs) add queries agains...
Scott A. Crosby, Dan S. Wallach
ICISS
2005
Springer
14 years 3 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
ICMCS
2000
IEEE
86views Multimedia» more  ICMCS 2000»
14 years 2 months ago
Water-Filling for Watermarking?
In this paper we address the question: Is water-filling appropriate for watermarking? The water-filling paradigm is a traditional solution to the capacity maximization of parall...
Deepa Kundur
ECOOP
1997
Springer
14 years 2 months ago
Subtyping Is Not a Good "Match" for Object-Oriented Languages
We present the design and rationale of a new statically-typed object-oriented language, LOOM. LOOM retains most of the features of the earlier language PolyTOIL. However the subtyp...
Kim B. Bruce, Leaf Petersen, Adrian Fiech