Sciweavers

15379 search results - page 86 / 3076
» Protecting users from
Sort
View
ICCAD
2002
IEEE
103views Hardware» more  ICCAD 2002»
14 years 4 months ago
A technology-independent CAD tool for ESD protection device extraction: ESDExtractor
The challenges for developing an ESD (Electro-static Discharge) layout extractor originate from unconventional layout patterns of ESD protection devices, parasitic ESD device extr...
Rouying Zhan, Haigang Feng, Qiong Wu, Guang Chen, ...
ICASSP
2009
IEEE
14 years 2 months ago
Secure image retrieval through feature protection
This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focus...
Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, M...
DASFAA
2007
IEEE
163views Database» more  DASFAA 2007»
14 years 2 months ago
Protecting Individual Information Against Inference Attacks in Data Publishing
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Chen Li, Houtan Shirani-Mehr, Xiaochun Yang
ICC
2007
IEEE
14 years 2 months ago
Determination of Optimal Distortion-Based Protection in Progressive Image Transmission: a Heuristic Approach
— In this paper a method for the fast determination of distortion-based optimal unequal error protection (UEP) of bitstreams generated by embedded image coders is described. The ...
Alessio Torquati, Maria Fresia, Fabio Lavagetto
IWIA
2006
IEEE
14 years 1 months ago
High Robustness Requirements in a Common Criteria Protection Profile
The development of a Common Criteria protection profile for high-robustness separation kernels requires explicit modifications of several Common Criteria requirements as well as e...
Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvin...