Sciweavers

8701 search results - page 54 / 1741
» Protecting information on the Web
Sort
View
IH
1998
Springer
14 years 2 months ago
Secure Copyright Protection Techniques for Digital Images
This paper2 presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images ...
Alexander Herrigel, Joseph Ó Ruanaidh, Holg...
EATIS
2007
ACM
14 years 1 months ago
Protection of technological measures: juridical definition of a technical tool
The present work aims to bring to discussion and to analysis, the texts of the 6th article of the 2001/29/EC Directive (22nd of May) and the 217th article of the Portuguese law 50...
Lígia Lopes de Sousa Carreto
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
14 years 1 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
ICDCS
2009
IEEE
14 years 7 months ago
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile envir...
Donggang Liu
ICASSP
2009
IEEE
14 years 4 months ago
Secure image retrieval through feature protection
This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focus...
Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, M...