Sciweavers

15379 search results - page 88 / 3076
» Protecting users from
Sort
View
ICMCS
2006
IEEE
104views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Protection of 3D Object Visual Representations
In this paper, we describe a new framework for watermarking 3D objects via their contour information. Unlike most conventional 3D object watermarking techniques, for which both in...
Jihane Bennour, Jean-Luc Dugelay
COMPSAC
2003
IEEE
14 years 1 months ago
Protecting Distributed Software Upgrades that Involve Message-Passing Interface Changes
We present in this paper an extension of the messagedriven confidence-driven framework that we developed for onboard guarded software upgrading. The purpose of this work is to pr...
Ann T. Tai, Kam S. Tso, William H. Sanders
DRM
2003
Springer
14 years 29 days ago
The Darknet and the Future of Content Protection
We investigate the darknet – a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protoc...
Peter Biddle, Paul England, Marcus Peinado, Bryan ...
ICSE
2003
IEEE-ACM
14 years 29 days ago
A Dependable Architecture for COTS-Based Software Systems Using Protective Wrappers
Commercial off-the-shelf (COTS) software components are built to be used as black boxes that cannot be modified. The specific context in which these COTS components are employed is...
Paulo Asterio de Castro Guerra, Cecília M. ...
DAGSTUHL
2006
13 years 9 months ago
Denial of Service Protection with Beaver
We present Beaver, a method and architecture to "build dams" to protect servers from Denial of Service (DoS) attacks. Beaver allows efficient filtering of DoS traffic us...
Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Roma...