Sciweavers

362 search results - page 60 / 73
» Extending the Resynchronization Attack
Sort
View
MMSEC
2006
ACM
220views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Robust blind watermarking mechanism for motion data streams
The commercial reuse of 3D motion capture (Mocap) data in animation and life sciences raises issues with respect to its copyright. In order to improvise content protection of Moca...
Parag Agarwal, Ketaki Adi, B. Prabhakaran
CSFW
2005
IEEE
14 years 2 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System
We present the first cryptographically sound Dolev-Yaostyle security proof of a comprehensive electronic payment system. The payment system is a slightly simplified variant of t...
Michael Backes, Markus Dürmuth
ICMCS
2005
IEEE
218views Multimedia» more  ICMCS 2005»
14 years 2 months ago
A Mid-level Visual Concept Generation Framework for Sports Analysis
The development of mid-level concepts helps to bridge the gap between low-level feature and high-level semantics in video analysis. Most existing work combines the customized mid-...
Xiaofeng Tong, Lingyu Duan, Hanqing Lu, Changsheng...
ACMSE
2005
ACM
14 years 2 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha
PADS
2005
ACM
14 years 2 months ago
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises
The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of...
Michael Liljenstam, Jason Liu, David M. Nicol, You...