Sciweavers

986 search results - page 17 / 198
» Protecting the Intranet Against
Sort
View
ISW
2000
Springer
13 years 11 months ago
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling
Abstract. Two robust spatial-domain watermarking algorithms for image copyright protection are described in this paper. The first one is robust against compression, filtering and c...
Francesc Sebé, Josep Domingo-Ferrer, Jordi ...
FC
2008
Springer
85views Cryptology» more  FC 2008»
13 years 9 months ago
Countermeasures against Government-Scale Monetary Forgery
Abstract. Physical cash is vulnerable to rising threats, such as large-scale, government-mandated forgeries, that digital cash may protect against more effectively. We study mechan...
Alessandro Acquisti, Nicolas Christin, Bryan Parno...
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 2 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
CONEXT
2009
ACM
13 years 9 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
CSREAESA
2007
13 years 9 months ago
IT Security Protection at Field Level of Industrial Automation Systems
—Current industrial automation systems are virtually unprotected against attacks on IT security at field level, especially if an attacker is able to connect physically to field...
Felix Gutbrodt