Sciweavers

110 search results - page 12 / 22
» Security Evaluation Of Informed Watermarking Schemes
Sort
View
TWC
2008
138views more  TWC 2008»
13 years 8 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
CODASPY
2012
12 years 4 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
IPOM
2009
Springer
14 years 3 months ago
A Feasibility Evaluation on Name-Based Routing
Abstract. The IPv4 addressing scheme has been the standard for Internet communication since it was established in the 1960s. However, the enormous increase in Internet traffic usag...
Haesung Hwang, Shingo Ata, Masayuki Murata
ISM
2006
IEEE
95views Multimedia» more  ISM 2006»
14 years 2 months ago
Digital Rights Management for Video Sensor Network
Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure. In this paper, we argue that when video sensor network ...
Taojun Wu, Liang Dai, Yuan Xue, Yi Cui
ICPR
2008
IEEE
14 years 10 months ago
Securing fingerprint template: Fuzzy vault with minutiae descriptors
Fuzzy vault has been shown to be an effective technique for securing fingerprint minutiae templates. Its security depends on the difficulty in identifying the set of genuine minut...
Abhishek Nagar, Anil K. Jain, Karthik Nandakumar