Sciweavers

2500 search results - page 137 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
IH
2004
Springer
14 years 3 months ago
Improved Detection of LSB Steganography in Grayscale Images
We consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale bitmap images and simple LSB steganography. Using a dist...
Andrew D. Ker
EDCC
1999
Springer
14 years 2 months ago
Achieving Fault-Tolerant Ordered Broadcasts in CAN
The paper focuses on the problem to guarantee reliable and ordered message delivery to the operational sites of a CAN-Bus network. The contributions of the paper are firstly a hard...
Jörg Kaiser, Mohammad Ali Livani
EUROSYS
2011
ACM
13 years 1 months ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...
CCS
2007
ACM
14 years 4 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
AIMS
2007
Springer
14 years 4 months ago
IBGP Confederation Provisioning
This paper proposes an optimization method for the design of large scale confederation based BGP networks. We propose a graph based model and an associated metric to evaluate the r...
Mohamed Nassar, Radu State, Olivier Festor