Sciweavers

731 search results - page 51 / 147
» Special Section on Information and Communication System Secu...
Sort
View
LNCS
1993
14 years 1 months ago
Multimedia Database Systems
– In the past few years considerable demand for user oriented multimedia information systems has developed. These systems must provide a rich set of functionality so that new, co...
Arif Ghafoor, P. Bruce Berra
IJIEM
2010
171views more  IJIEM 2010»
13 years 7 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
CCR
2000
78views more  CCR 2000»
13 years 8 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas
ICINCO
2004
122views Robotics» more  ICINCO 2004»
13 years 10 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä
MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini