Sciweavers

1116 search results - page 157 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
AMC
2007
134views more  AMC 2007»
13 years 8 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
ECCV
2000
Springer
14 years 9 months ago
Non-parametric Model for Background Subtraction
Abstract. Background subtraction is a method typically used to segment moving regions in image sequences taken from a static camera by comparing each new frame to a model of the sc...
Ahmed M. Elgammal, David Harwood, Larry S. Davis
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
14 years 1 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang
SOFTVIS
2005
ACM
14 years 1 months ago
Exploiting UML dynamic object modeling for the visualization of C++ programs
In this paper we present an approach to modeling and visualizing the dynamic interactions among objects in a C++ application. We exploit UML diagrams to expressively visualize bot...
Brian A. Malloy, James F. Power