Sciweavers

15379 search results - page 155 / 3076
» Protecting users from
Sort
View
SSWMC
2004
13 years 9 months ago
Collusion-resistant multimedia fingerprinting: a unified framework
Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an intended recipient, and can...
Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu
ECIS
2000
13 years 9 months ago
Decision Support for Flight Re-Routing in Europe
Congestion has plagued air traffic in the US and in Europe for nearly 20 years. To protect air traffic control from overloads, air traffic flow management tries to anticipate and ...
P. A. Leal de Matos, P. L. Powell
DCC
2007
IEEE
13 years 8 months ago
Sequential and dynamic frameproof codes
There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes and traitor-tracing schemes. The c...
Maura B. Paterson
TKDE
2010
135views more  TKDE 2010»
13 years 6 months ago
A Rule-Based Trust Negotiation System
—Open distributed environments such as the World Wide Web facilitate information sharing but provide limited support to the protection of sensitive information and resources. Tru...
Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedil...
SOCIALCOM
2010
13 years 5 months ago
q-Anon: Rethinking Anonymity for Social Networks
This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as kanonymity...
Aaron Beach, Mike Gartrell, Richard Han