Sciweavers

1562 search results - page 239 / 313
» Mathematics, Cryptology, Security
Sort
View
ICB
2007
Springer
104views Biometrics» more  ICB 2007»
14 years 2 months ago
Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection
This paper addresses the biometric template security issue. Follow out previous work on class distribution transform, the proposed scheme selects the distinguish points automatical...
Yi C. Feng, Pong C. Yuen
AGENTS
2000
Springer
14 years 15 days ago
Frameworks for Reasoning about Agent Based Systems
This paper suggests formal frameworks that can be used as the basis for defining, reasoning about, and verifying properties of agent systems. The language, Little-JIL is graphical...
Leon J. Osterweil, Lori A. Clarke
ACSAC
2000
IEEE
13 years 11 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
CCS
2008
ACM
13 years 10 months ago
Using rhythmic nonces for puzzle-based DoS resistance
To protect against replay attacks, many Internet protocols rely on nonces to guarantee freshness. In practice, the server generates these nonces during the initial handshake, but ...
Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni P...
CORR
2010
Springer
191views Education» more  CORR 2010»
13 years 7 months ago
Dual Watermarking Scheme with Encryption
-- Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT-SVD with chaos encryption algorithm, wi...
R. Dhanalakshmi, K. Thaiyalnayaki