Sciweavers

374 search results - page 27 / 75
» Rights Protection for Relational Data
Sort
View
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
CIS
2004
Springer
14 years 2 months ago
Fast Query Over Encrypted Character Data in Database
There are a lot of very important data in database, which need to be protected from attacking. Cryptographic support is an important mechanism of securing them. People, however, mu...
Zheng-Fei Wang, Jing Dai, Wei Wang 0009, Baile Shi
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
14 years 3 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
TCSV
2008
124views more  TCSV 2008»
13 years 8 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
AADEBUG
2005
Springer
14 years 2 months ago
Debugging object-oriented programs with behavior views
A complex software system may perform many program tasks during execution to provide the required functionalities. To detect and localize bugs related to the implementation of the...
Donglin Liang, Kai Xu 0002