Sciweavers

176 search results - page 29 / 36
» Distinguishing Attacks on T-Functions
Sort
View
HICSS
2008
IEEE
163views Biometrics» more  HICSS 2008»
14 years 2 months ago
Building a Test Suite for Web Application Scanners
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
ICC
2007
IEEE
14 years 2 months ago
Constrained Wavelet Tree Quantization for Image Watermarking
This paper investigates the operations of the wavelet tree based quantization and proposes a constrained wavelet tree quantization for image watermarking. The wavelet coefficients ...
Min-Jen Tsai, Chen-Long Lin
ICCCN
2007
IEEE
14 years 2 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
ICDCS
2007
IEEE
14 years 2 months ago
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
14 years 2 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran