Sciweavers

923 search results - page 172 / 185
» Improved Slide Attacks
Sort
View
JDCTA
2010
187views more  JDCTA 2010»
13 years 4 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
TITB
2010
128views Education» more  TITB 2010»
13 years 4 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
TSMC
2010
13 years 4 months ago
Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions
Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness...
Xinbo Gao, Cheng Deng, Xuelong Li, Dacheng Tao
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
14 years 11 months ago
Design, Implementation, and Evaluation of a Repairable Database Management System
Although conventional database management systems are designed to tolerate hardware and to a lesser extent even software errors, they cannot protect themselves against syntactical...
Tzi-cker Chiueh, Dhruv Pilania
WWW
2005
ACM
14 years 10 months ago
Finding group shilling in recommendation system
In the age of information explosion, recommendation system has been proved effective to cope with information overload in ecommerce area. However, unscrupulous producers shill the...
Xue-Feng Su, Hua-Jun Zeng, Zheng Chen