Sciweavers

96 search results - page 12 / 20
» On provenance and privacy
Sort
View
APVIS
2007
13 years 9 months ago
Visualization of sanitized email logs for spam analysis
Email has become an integral method of communication. However, it is still plagued by vast amounts of spam. Many statistical techniques, such as Bayesian filtering, have been app...
Chris Muelder, Kwan-Liu Ma
ICPR
2010
IEEE
13 years 5 months ago
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding
In this article, a new fragile, blind, high payload capacity, ROI (Region of Interest) preserving Medical image watermarking (MIW) technique in the spatial domain for grayscale med...
Malay Kumar Kundu, Sudeb Das
COMSUR
2011
218views Hardware» more  COMSUR 2011»
12 years 7 months ago
A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)
Abstract—Exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol (SIP) has proven difficult. The challenge is to effectively exchange keys w...
Vijay K. Gurbani, Vladimir Kolesnikov
IEEEARES
2006
IEEE
14 years 1 months ago
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF
Abstract— Most e-government applications have to find a solution for simple, reliable, secure and authentic signing of official documents. Citizens need a simple way to verify ...
Thomas Neubauer, Edgar Weippl, Stefan Biffl
EUROPKI
2007
Springer
13 years 11 months ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...