Sciweavers

1875 search results - page 342 / 375
» Modeling the Security of Steganographic Systems
Sort
View
FC
2007
Springer
111views Cryptology» more  FC 2007»
14 years 4 months ago
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et...
Liqun Chen, Alberto N. Escalante, Hans Löhr, ...
DRM
2005
Springer
14 years 3 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
TLDI
2003
ACM
14 years 3 months ago
The logical approach to stack typing
We develop a logic for reasoning about adjacency and separation of memory blocks, as well as aliasing of pointers. We provide a memory model for our logic and present a sound set ...
Amal J. Ahmed, David Walker
ICALP
1999
Springer
14 years 2 months ago
Wide Area Computation
Abstract. The last decades have seen the emergence of the sea of objects paradigm for structuring complex distributed systems on workstations and local area networks. In this appro...
Luca Cardelli
BIOSIG
2008
166views Biometrics» more  BIOSIG 2008»
13 years 11 months ago
Improving Border Control with 3D Face Recognition
: Biometric data have been integrated in all new European passports, since the member states of the European Commission started to implement the EU Council Regulation No 2252/2004 ...
Paul Welti, Jean-Marc Suchier, Christoph Busch