Sciweavers

14850 search results - page 2949 / 2970
» The Security of
Sort
View
SAC
2010
ACM
13 years 6 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 5 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
SIAMJO
2010
121views more  SIAMJO 2010»
13 years 5 months ago
Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid
Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerabilit...
Ali Pinar, Juan Meza, Vaibhav Donde, Bernard C. Le...
SUM
2010
Springer
13 years 5 months ago
Event Modelling and Reasoning with Uncertain Information for Distributed Sensor Networks
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Jianbing Ma, Weiru Liu, Paul Miller
TMC
2010
179views more  TMC 2010»
13 years 5 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
« Prev « First page 2949 / 2970 Last » Next »