Sciweavers

3638 search results - page 129 / 728
» Distribution chain security
Sort
View
122
Voted
CCS
2008
ACM
15 years 4 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
114
Voted
GCC
2003
Springer
15 years 7 months ago
Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation
An instance-oriented security mechanism is proposed to deal with security threats in building a general-purpose mobile agent middleware in Grid environment. The proposed solution i...
Tianchi Ma, Shanping Li
106
Voted
CSREASAM
2006
15 years 4 months ago
A Study on DRM System for On/Off Line Key Authentication
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...
117
Voted
TIFS
2010
128views more  TIFS 2010»
15 years 1 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....
117
Voted
AINA
2006
IEEE
15 years 8 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi