Sciweavers

1288 search results - page 110 / 258
» Securing aspect composition
Sort
View
ASIACRYPT
2007
Springer
14 years 4 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...
ICIP
2005
IEEE
14 years 12 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
PKC
2010
Springer
177views Cryptology» more  PKC 2010»
14 years 2 months ago
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
We propose new and improved instantiations of lossy trapdoor functions (Peikert and Waters, STOC ’08), and correlation-secure trapdoor functions (Rosen and Segev, TCC ’09). Ou...
David Mandell Freeman, Oded Goldreich, Eike Kiltz,...
WWW
2007
ACM
14 years 11 months ago
A framework for rapid integration of presentation components
The development of user interfaces (UIs) is one of the most timeconsuming aspects in software development. In this context, the lack of proper reuse mechanisms for UIs is increasi...
Boualem Benatallah, Fabio Casati, Florian Daniel, ...
WETICE
2002
IEEE
14 years 3 months ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...