Sciweavers

796 search results - page 52 / 160
» Spoofing prevention method
Sort
View
ETRICS
2006
14 years 1 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
FORMATS
2006
Springer
14 years 1 months ago
Timed Alternating-Time Temporal Logic
We add freeze quantifiers to the game logic ATL in order to specify real-time objectives for games played on timed structures. We define the semantics of the resulting logic TATL b...
Thomas A. Henzinger, Vinayak S. Prabhu
ICIP
1994
IEEE
14 years 1 months ago
Active Region Models for Segmenting Medical Images
This paper describes a new region-growing method for segmenting medical images. The method uses a closed snake driven by a pressure force that is a function of the statistical cha...
Jim Ivins, John Porrill
APVIS
2007
13 years 11 months ago
Visualization of sanitized email logs for spam analysis
Email has become an integral method of communication. However, it is still plagued by vast amounts of spam. Many statistical techniques, such as Bayesian filtering, have been app...
Chris Muelder, Kwan-Liu Ma
BNCOD
2008
88views Database» more  BNCOD 2008»
13 years 11 months ago
An Empirical Study of Utility Measures for k-Anonymisation
Abstract. k-Anonymisation is a technique for masking microdata in order to prevent individual identification. Besides preserving privacy, data anonymised by such a method must also...
Grigorios Loukides, Jianhua Shao