Sciweavers

3482 search results - page 222 / 697
» Designing for security
Sort
View
115
Voted
SIGCSE
2005
ACM
240views Education» more  SIGCSE 2005»
15 years 8 months ago
A Java framework for experimentation with steganography
This article describes a Java framework for experimentation with fundamental steganographic techniques. The framework is built on top of Java's image processing libraries and...
Kenny Hunt
131
Voted
SIGUCCS
2005
ACM
15 years 8 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
138
Voted
PERCOM
2005
ACM
16 years 2 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
115
Voted
DCC
2008
IEEE
16 years 2 months ago
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
Berkant Ustaoglu
124
Voted
CCS
2007
ACM
15 years 9 months ago
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
We construct two new multiparty digital signature schemes that allow multiple signers to sequentially produce a compact, fixed-length signature. First, we introduce a new primiti...
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, D...