Sciweavers

1094 search results - page 104 / 219
» List signature schemes
Sort
View
ICIP
2001
IEEE
14 years 11 months ago
A hierarchical image authentication watermark with improved localization and security
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to imp...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
E2EMON
2006
IEEE
14 years 4 months ago
A Hybrid Approach for Accurate Application Traffic Identification
—The traffic dynamics of the Internet’s dominant applications, such as peer-to-peer and multimedia, worsen the accuracy of the existing application traffic identification. Ther...
Young J. Won, Byung-Chul Park, Hong-Taek Ju, Myung...
CCR
2007
115views more  CCR 2007»
13 years 10 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
TIP
2002
102views more  TIP 2002»
13 years 9 months ago
Hierarchical watermarking for secure image authentication with localization
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to impr...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
COMCOM
1999
73views more  COMCOM 1999»
13 years 9 months ago
Securing digital signatures for non-repudiation
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable ...
Jianying Zhou, Kwok-Yan Lam