Sciweavers

135 search results - page 25 / 27
» Encompassing Attacks to Attacks in Abstract Argumentation Fr...
Sort
View
ASWEC
2008
IEEE
14 years 1 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Fingerprinting System for Musical Content
Abstract— Driven by the recent advances in digital entertainment technologies, digital multimedia content (such as music and movies) is becoming a major part of the average compu...
Lahouari Ghouti, Ahmed Bouridane, Mohammad K. Ibra...
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 25 days ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
SACRYPT
2004
Springer
143views Cryptology» more  SACRYPT 2004»
14 years 21 days ago
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
IH
2001
Springer
13 years 11 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu