Sciweavers

15379 search results - page 457 / 3076
» Protecting users from
Sort
View
PAISI
2007
Springer
15 years 10 months ago
Informed Recognition in Software Watermarking
Software watermarking is a technique to protect programs from piracy through embedding secret information into the programs. As software unauthorized use and modification are ubiq...
William Zhu
DEXAW
2002
IEEE
101views Database» more  DEXAW 2002»
15 years 9 months ago
An Electronic Payment Scheme Allowing Special Rates for Anonymous Regular Customers
Anonymous electronic payment systems are regarded as essential for the protection of the privacy of consumers participating in electronic transactions. In this paper, we present a...
Chunfu Tan, Jianying Zhou
INFOCOM
2000
IEEE
15 years 9 months ago
Effects of Interleaving on RTP Header Compression
— We discuss the use of interleaving as a bandwidth efficient means of protecting audio streams from the effects of packet loss in the Internet. The adverse effects of interleav...
Colin Perkins, Jon Crowcroft
DGO
2004
124views Education» more  DGO 2004»
15 years 6 months ago
Data Confidentiality, Data Quality and Data Integration for Federal Databases
cipal high-level goal of the research is to develop abstractions, theory and methodology and software tools that allow federal statistical agencies to disseminate useful informatio...
Alan F. Karr
BIOSIG
2009
136views Biometrics» more  BIOSIG 2009»
15 years 2 months ago
Tamper-proof and Privacy-protected Fingerprint Identification Systems
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
Michael Schwaiger