Sciweavers

985 search results - page 85 / 197
» On the validity of digital signatures
Sort
View
JDFP
2008
81views more  JDFP 2008»
13 years 9 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
DAC
2004
ACM
14 years 10 months ago
Proxy-based task partitioning of watermarking algorithms for reducing energy consumption in mobile devices
Digital watermarking is a process that embeds an imperceptible signature or watermark in a digital file containing audio, image, text or video data. The watermark is later used to...
Arun Kejariwal, Sumit Gupta, Alexandru Nicolau, Ni...
SEC
2007
13 years 10 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...
ICDIM
2009
IEEE
14 years 3 months ago
Augmenting the exploration of digital libraries with web-based visualizations
Web-based digital libraries have sped up the process that scholars use to find new, important research papers. Unfortunately, current digital libraries are limited by their inade...
Peter Bergstrom, Darren C. Atkinson
ICDAR
2009
IEEE
13 years 6 months ago
Prototype Selection for Handwritten Connected Digits Classification
After the handwritten segmentation process, it is common to have connected digits. This is due to the great size and shape digit variations. In addition, the acquisition and the b...
Cristiano de Santana Pereira, George D. C. Cavalca...