Sciweavers

536 search results - page 52 / 108
» Embedding Information Security into the Organization
Sort
View
WWW
2007
ACM
14 years 8 months ago
Integrating web directories by learning their structures
Documents in the Web are often organized using category trees by information providers (e.g. CNN, BBC) or search engines (e.g. Google, Yahoo!). Such category trees are commonly kn...
Christopher C. Yang, Jianfeng Lin
WIKIS
2009
ACM
14 years 2 months ago
Suffr: democratic control of computing infrastructure
Suffr uses Wiki to facilitate corporate governance. Suffr allows a group's members to administer a computer system and its information resources collectively. Categories and ...
Kirk Zurell
MMSEC
2006
ACM
220views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Robust blind watermarking mechanism for motion data streams
The commercial reuse of 3D motion capture (Mocap) data in animation and life sciences raises issues with respect to its copyright. In order to improvise content protection of Moca...
Parag Agarwal, Ketaki Adi, B. Prabhakaran
PST
2004
13 years 9 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
IH
2007
Springer
14 years 2 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...