Sciweavers

859 search results - page 80 / 172
» Security for Key Management Interfaces
Sort
View
ACL
1998
13 years 11 months ago
Robust Interaction through Partial Interpretation and Dialogue Management
In this paper we present results on developing robust natural language interfaces by combining shallowand partialinterpretationwith dialoguemanagement. The key issue is to reduce ...
Arne Jönsson, Lena Strömbäck
IH
1998
Springer
14 years 2 months ago
Secure Copyright Protection Techniques for Digital Images
This paper2 presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images ...
Alexander Herrigel, Joseph Ó Ruanaidh, Holg...
ADHOC
2007
104views more  ADHOC 2007»
13 years 10 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
SISW
2005
IEEE
14 years 3 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
14 years 3 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick