Sciweavers

15379 search results - page 63 / 3076
» Protecting users from
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
Towards optimal design of signal fingerprinting codes
Digital fingerprinting aims at protecting multimedia contents from illegal redistribution by embedding imperceptible fingerprints identifying the users. We propose two approache...
Jean-Francois Jourdas, Pierre Moulin
CCS
2001
ACM
14 years 6 days ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
IWDC
2001
Springer
114views Communications» more  IWDC 2001»
14 years 4 days ago
A Protection-Based Approach to QoS in Packet over Fiber Networks
We propose a novel approach to Quality of Service, intended for IP over SONET (or IP over WDM) networks, that offers end-users the choice between two service classes defined acco...
Patrick Thiran, Nina Taft, Christophe Diot, Hui Za...
CODES
2007
IEEE
14 years 2 months ago
A data protection unit for NoC-based architectures
Security is gaining increasing relevance in the development of embedded devices. Towards a secure system at each level of design, this paper addresses the security aspects related...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 2 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu