Sciweavers

246 search results - page 19 / 50
» Informed secure watermarking using optimal transport
Sort
View
DASFAA
2009
IEEE
195views Database» more  DASFAA 2009»
14 years 2 months ago
The XMLBench Project: Comparison of Fast, Multi-platform XML libraries
The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
Suren Chilingaryan
MIS
1998
Springer
103views Multimedia» more  MIS 1998»
14 years 6 days ago
NETCICATS: Network-Conscious Image Compression and Transmission System
NETCICATS is a software system for empirically evaluating network-conscious image compression, an approach that does not simply optimize compression, but which optimizes overall pe...
Sami Iren, Paul D. Amer, Phillip T. Conrad
FC
2007
Springer
128views Cryptology» more  FC 2007»
14 years 2 months ago
Informant: Detecting Sybils Using Incentives
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one i...
N. Boris Margolin, Brian Neil Levine
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
SOUPS
2010
ACM
13 years 12 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...