Sciweavers

15379 search results - page 226 / 3076
» Protecting users from
Sort
View
101
Voted
ICDAR
2009
IEEE
15 years 10 months ago
Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds
The partial copy is a kind of copy produced by cropping parts of original materials. Illegal users often use this technique for plagiarizing copyrighted materials. In addition, or...
Weihan Sun, Koichi Kise
92
Voted
SMC
2007
IEEE
15 years 9 months ago
Improved collusion-secure codes for digital fingerprinting based on finite geometries
Abstract— Digital fingerprinting, a copyright protection technique for digital contents, is considered. Digital fingerprinting should deter collusion attacks, where several fi...
Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hiras...
103
Voted
ICCSA
2005
Springer
15 years 9 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
SIGCOMM
2010
ACM
15 years 3 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
IJDE
2006
77views more  IJDE 2006»
15 years 3 months ago
Hidden Disk Areas: HPA and DCO
This paper focuses on certain manufacturer hidden areas of a hard disk, specifically Host Protected Areas (HPA) and Device Configuration Overlays (DCO). These areas can be problem...
Mayank R. Gupta, Michael D. Hoeschele, Marcus K. R...