Sciweavers

151 search results - page 14 / 31
» Flexible Alias Protection
Sort
View
ICIP
2004
IEEE
14 years 9 months ago
Redundant image representations in security applications
To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of no...
Philippe Jost, Pierre Vandergheynst, Pascal Frossa...
RTCSA
2006
IEEE
14 years 1 months ago
Predictable Interrupt Scheduling with Low Overhead for Real-Time Kernels
In this paper we analyze the traditional model of interrupt management and its inability to incorporate the reliability and temporal predictability demanded by real-time systems. ...
Luis E. Leyva-del-Foyo, Pedro Mejía-Alvarez...
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
13 years 11 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
TWC
2008
170views more  TWC 2008»
13 years 7 months ago
Secure and Serverless RFID Authentication and Search Protocols
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID proto...
Chiu Chiang Tan, Bo Sheng, Qun Li
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 9 months ago
Mondrian Multidimensional K-Anonymity
K-Anonymity has been proposed as a mechanism for protecting privacy in microdata publishing, and numerous recoding "models" have been considered for achieving kanonymity...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...