Sciweavers

81 search results - page 13 / 17
» Sensitivity Analysis Attacks Against Randomized Detectors
Sort
View
IWIA
2005
IEEE
14 years 4 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
CSREASAM
2006
14 years 9 days ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
14 years 3 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
SAC
2006
ACM
14 years 4 months ago
On the use of spectral filtering for privacy preserving data mining
Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining.The previous work based on spectral filtering, show the noise ma...
Songtao Guo, Xintao Wu
IEEECIT
2010
IEEE
13 years 9 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi