Sciweavers

986 search results - page 98 / 198
» Protecting the Intranet Against
Sort
View
ICIP
2005
IEEE
14 years 9 months ago
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digi...
H. Vicky Zhao, K. J. Ray Liu
ESORICS
2009
Springer
14 years 8 months ago
The Coremelt Attack
Current Denial-of-Service (DoS) attacks are directed towards a specific victim. The research community has devised several countermeasures that protect victim hosts against undesir...
Ahren Studer, Adrian Perrig
CHES
2009
Springer
137views Cryptology» more  CHES 2009»
14 years 8 months ago
Faster and Timing-Attack Resistant AES-GCM
We present a bitsliced implementation of AES encryption in counter mode for 64-bit Intel processors. Running at 7.59 cycles/byte on a Core 2, it is up to 25% faster than previous i...
Emilia Käsper, Peter Schwabe
SIGMOD
2008
ACM
102views Database» more  SIGMOD 2008»
14 years 8 months ago
Stream firewalling of xml constraints
As XML-based messages have become common in many client-server protocols, there is a need to protect application servers from invalid or dangerous messages. This leads to the XML ...
Michael Benedikt, Alan Jeffrey, Ruy Ley-Wild
DCC
2008
IEEE
14 years 7 months ago
Dimension Reduction and Expansion: Distributed Source Coding in a Noisy Environment
We studied the problem of distributed coding and transmission of intercorrelated sources with memory. Different from the conventional distributed source coding structure which rel...
Anna N. Kim, Fredrik Hekland