Sciweavers

151 search results - page 16 / 31
» Protecting Users against Phishing Attacks
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
Anti-collusion fingerprinting with scalar Costa scheme (SCS) and colluder weight recovery
— An anti-collusion fingerprinting system is developed to protect media files against time-varying collusion attacks based on the scalar Costa scheme (SCS) and colluder weight ...
Byung-Ho Cha, C.-C. Jay Kuo
WIDM
2005
ACM
14 years 1 months ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...
CORR
2012
Springer
227views Education» more  CORR 2012»
12 years 3 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
ICIP
2005
IEEE
14 years 9 months ago
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digi...
H. Vicky Zhao, K. J. Ray Liu
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 8 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer