Sciweavers

905 search results - page 89 / 181
» Public key distribution through
Sort
View
IEEESCC
2007
IEEE
14 years 3 months ago
Enabling User Control with Personal Identity Management
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
Ty Mey Eap, Marek Hatala, Dragan Gasevic
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 3 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
INFOCOM
2005
IEEE
14 years 2 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
MMSEC
2005
ACM
114views Multimedia» more  MMSEC 2005»
14 years 2 months ago
Watermarking of MPEG-2 video in compressed domain using VLC mapping
In this work we propose a new algorithm for fragile, high capacity yet file-size preserving watermarking of MPEG-2 streams. Watermarking is done entirely in the compressed domain,...
Bijan G. Mobasseri, Michael P. Marcinak
SBIA
2004
Springer
14 years 2 months ago
Applying a Lexical Similarity Measure to Compare Portuguese Term Collections
The number of ontologies publicly available and accessible through the web has increased in the last years, so that the task of finding similar terms1 among these structures becom...
Marcirio Silveira Chaves, Vera Lúcia Strube...