Sciweavers

653 search results - page 109 / 131
» Security Architecture for Federated Cooperative Information ...
Sort
View
IUI
2003
ACM
14 years 29 days ago
Towards individual service provisioning
With the emergence of modularized componentbased electronic services, such as Web Services and semantically tagged services, Individual Service Provisioning, wherein any user can ...
Fredrik Espinoza
WIKIS
2009
ACM
14 years 2 months ago
Wiki credibility enhancement
Wikipedia has been very successful as an open encyclopedia which is editable by anybody. However, the anonymous nature of Wikipedia means that readers may have less trust since th...
Felix Halim, Yongzheng Wu, Roland H. C. Yap
MMSEC
2005
ACM
274views Multimedia» more  MMSEC 2005»
14 years 1 months ago
LSB steganalysis based on high-order statistics
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
Sorina Dumitrescu, Xiaolin Wu
FC
2005
Springer
99views Cryptology» more  FC 2005»
14 years 1 months ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine
GROUP
2003
ACM
14 years 29 days ago
Supporting activity-centric collaboration through peer-to-peer shared objects
We describe a new collaborative technology that is mid-way between the informality of email and the formality of shared workspaces. Email and other ad hoc collaboration systems ar...
Werner Geyer, Jürgen Vogel, Li-Te Cheng, Mich...