Sciweavers

1116 search results - page 84 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
LCN
2007
IEEE
14 years 2 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
SIP
2007
13 years 9 months ago
Mosaic-based figure-ground segmentation along with static segmentation by mean shift
This work deals with the problem of backgroundforeground segmentation in video scenes. We propose an approach that makes use of feature extraction and matching, robust estimation,...
J. Sole, Yu Huang, Joan Llach
MTA
2007
82views more  MTA 2007»
13 years 7 months ago
A scalable signature scheme for video authentication
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharin...
Pradeep K. Atrey, Wei-Qi Yan, Mohan S. Kankanhalli
IJCIS
2006
80views more  IJCIS 2006»
13 years 8 months ago
A Layered Framework for Connecting Client Objectives and Resource Capabilities
entifies three levels of abstraction for resource requirements a service provider needs to manage, detailed specification of raw resources, virtualization of heterogeneous resource...
Asit Dan, Kavitha Ranganathan, Catalin Dumitrescu,...
IFIP
2010
Springer
13 years 2 months ago
Efficient Decision Procedures for Message Deducibility and Static Equivalence
Abstract. We consider two standard notions in formal security protocol analysis: message deducibility and static equivalence under equational theories. We present polynomial-time a...
Bruno Conchinha, David A. Basin, Carlos Caleiro