In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to frag...
: Fair exchange protocols play an important role in application areas such as e-commerce where protocol participants require mutual guarantees that a transaction involving exchange...
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Users frequently have to choose between functionality and security. When running popular Web browsers or email clients, they frequently find themselves turning off features such a...
We propose a novel approach to self-regenerating continuously-operating systems. Such systems provide best-case solutions in security surveillance or decision making centers. We i...
M. M. Olsen, N. Siegelmann-Danieli, Hava T. Siegel...