Sciweavers

6137 search results - page 113 / 1228
» Securing Collaborative Applications
Sort
View
113
Voted
ICIP
2004
IEEE
16 years 3 months ago
Redundant image representations in security applications
To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of no...
Philippe Jost, Pierre Vandergheynst, Pascal Frossa...
99
Voted
SAINT
2007
IEEE
15 years 8 months ago
Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service
The Central Authentication Service (CAS) is a middleware for constructing a Single Sign On infrastructure for Web applications and has been developed by JA-SIG. In this paper, we ...
Hisashi Naito, Shoji Kajita, Yasushi Hirano, Kenji...
CCS
2005
ACM
15 years 7 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
111
Voted
ICT
2004
Springer
158views Communications» more  ICT 2004»
15 years 7 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
119
Voted
MCAM
2007
Springer
134views Multimedia» more  MCAM 2007»
15 years 8 months ago
Virtual Community Based Secure Service Discovery and Access for 3D Video Steaming Applications
The Freeband I-Share project aims to define the mechanisms for trust, willingness, resource discovery and sharing mechanisms in virtual communities. To improve the secure and perfo...
Shudong Chen, Igor Radovanovic, Johan Lukkien, Ric...