Sciweavers

246 search results - page 31 / 50
» Informed secure watermarking using optimal transport
Sort
View
JSAC
2011
184views more  JSAC 2011»
13 years 3 months ago
Goodput Enhancement of VANETs in Noisy CSMA/CA Channels
— The growing interest in vehicular ad hoc networks (VANETs) enables decentralized traveler information systems to become more feasible and effective in Intelligent Transportatio...
Yusun Chang, Christopher P. Lee, John A. Copeland
SACMAT
2005
ACM
14 years 1 months ago
Generalized XML security views
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadk...
VLDB
1998
ACM
134views Database» more  VLDB 1998»
14 years 6 days ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
IACR
2011
94views more  IACR 2011»
12 years 7 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
CJ
2006
123views more  CJ 2006»
13 years 8 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...