Sciweavers

986 search results - page 41 / 198
» Protecting the Intranet Against
Sort
View
ISSA
2008
13 years 10 months ago
The IP Protection of Electronic Databases: Copyright or Copywrong?
The protection of the intellectual investments embodied in databases is of the utmost importance. Technological innovation has rendered databases vulnerable to unauthorised access...
Tana Pistorius
ICIP
2005
IEEE
14 years 10 months ago
Transmission of JPEG2000 code-streams over mobile radio channels
- The recent growth in personal wireless communication devices being used for image transmission, have poised a challenge to protect this data against loss over mobile radio channe...
Ambarish Natu, Maria Fresia, Fabio Lavagetto
DCC
2009
IEEE
13 years 7 months ago
Wireless Video Transmission: A Single Layer Distortion Optimal Approach
In this paper, we introduce an analytical expression for the expected distortion of a single layer encoded video bit-stream. Based on the expected distortion model, we propose a d...
Negar Nejati, Homayoun Yousefi'zadeh, Hamid Jafark...
CCS
2001
ACM
14 years 1 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
ACISP
2000
Springer
14 years 1 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng