Sciweavers

131 search results - page 11 / 27
» Revocation Systems with Very Small Private Keys
Sort
View
ICIP
2001
IEEE
14 years 9 months ago
On the security of the SARI image authentication system
In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In pa...
Regunathan Radhakrishnan, Nasir D. Memon
PERVASIVE
2006
Springer
13 years 7 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
ICDM
2003
IEEE
141views Data Mining» more  ICDM 2003»
14 years 23 days ago
Association Rule Mining in Peer-to-Peer Systems
We extend the problem of association rule mining – a key data mining problem – to systems in which the database is partitioned among a very large number of computers that are ...
Ran Wolff, Assaf Schuster
FM
2009
Springer
153views Formal Methods» more  FM 2009»
13 years 5 months ago
Iterative Refinement of Reverse-Engineered Models by Model-Based Testing
Abstract. This paper presents an iterative technique to accurately reverseengineer models of the behaviour of software systems. A key novelty of the approach is the fact that it us...
Neil Walkinshaw, John Derrick, Qiang Guo
ACNS
2008
Springer
138views Cryptology» more  ACNS 2008»
14 years 1 months ago
Traceable and Retrievable Identity-Based Encryption
Abstract. Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susil...