Sciweavers

8701 search results - page 56 / 1741
» Protecting information on the Web
Sort
View
IJNSEC
2010
141views more  IJNSEC 2010»
13 years 4 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
ICC
2009
IEEE
127views Communications» more  ICC 2009»
14 years 4 months ago
Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
Abstract—Advances in mobile networks and positioning technologies have made location information a valuable asset in vehicular ad-hoc networks (VANETs). However, the availability...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ITCC
2005
IEEE
14 years 3 months ago
Protecting On-Line Casinos against Fraudulent Player Drop-Out
Some multiplayer, on-line games rely on the collaboration of all participating players. If a player’s gamble is aborted, the rest of players cannot continue playing. This behavi...
Joaquín García, Frédér...
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
13 years 11 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
WCE
2007
13 years 11 months ago
Beyond Web Intermediaries: A Framework for Securing Digital Content on Client Systems
—The move to begin to place liabilities for copyright violations on internet intermediaries such as ISPs and Cyber Cafes as a result of contents allowed through their networks is...
Stella C. Chiemeke, Olumide B. Longe