Sciweavers

6137 search results - page 113 / 1228
» Securing Collaborative Applications
Sort
View
ICIP
2004
IEEE
14 years 10 months ago
Redundant image representations in security applications
To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of no...
Philippe Jost, Pierre Vandergheynst, Pascal Frossa...
SAINT
2007
IEEE
14 years 3 months ago
Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service
The Central Authentication Service (CAS) is a middleware for constructing a Single Sign On infrastructure for Web applications and has been developed by JA-SIG. In this paper, we ...
Hisashi Naito, Shoji Kajita, Yasushi Hirano, Kenji...
CCS
2005
ACM
14 years 2 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
ICT
2004
Springer
158views Communications» more  ICT 2004»
14 years 2 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
MCAM
2007
Springer
134views Multimedia» more  MCAM 2007»
14 years 3 months ago
Virtual Community Based Secure Service Discovery and Access for 3D Video Steaming Applications
The Freeband I-Share project aims to define the mechanisms for trust, willingness, resource discovery and sharing mechanisms in virtual communities. To improve the secure and perfo...
Shudong Chen, Igor Radovanovic, Johan Lukkien, Ric...