Sciweavers

11603 search results - page 40 / 2321
» Securing Embedded Systems
Sort
View
FASE
2008
Springer
13 years 10 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
JMLC
2000
Springer
14 years 9 days ago
Derivation of Secure Parallel Applications by Means of Module Embedding
An enhancement to modular languages called module embedding facilitates the development and utilization of secure generic parallel algorithms.
Atanas Radenski
ICIP
2003
IEEE
14 years 10 months ago
Joint security & robustness enhancement for quantization embedding
This paper studies joint security and robustness enhancement of quantization based data embedding for multimedia authentication applications. We present analysis showing that thro...
M. Wu
ICASSP
2011
IEEE
13 years 13 days ago
Informed secure watermarking using optimal transport
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
Patrick Bas
JDCTA
2008
535views more  JDCTA 2008»
13 years 8 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...