Sciweavers

1323 search results - page 155 / 265
» Updatable Security Views
Sort
View
DBSEC
2001
154views Database» more  DBSEC 2001»
15 years 3 months ago
Regulating Access to XML documents
In this paper, our objective is to define a security model for regulating access to XML documents. Our model offers a security policy with a great expressive power. An XML documen...
Alban Gabillon, Emmanuel Bruno
94
Voted
ICISC
2003
117views Cryptology» more  ICISC 2003»
15 years 3 months ago
Binary Tree Encryption: Constructions and Applications
Binary tree encryption (BTE), a relaxation of hierarchical identity-based encryption (HIBE), has recently emerged as a useful and intriguing primitive. On the one hand, the defini...
Jonathan Katz
107
Voted
IJNSEC
2007
156views more  IJNSEC 2007»
15 years 2 months ago
Another Look at PMAC
We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than...
Dayin Wang, Dongdai Lin, Wenling Wu
MMS
2007
15 years 2 months ago
New approaches to encryption and steganography for digital videos
In this work we propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. We also present an ex...
Daniel Socek, Hari Kalva, Spyros S. Magliveras, Og...
113
Voted
ICASSP
2009
IEEE
15 years 9 months ago
Wildfire detection using LMS based active learning
A computer vision based algorithm for wildfire detection is developed. The main detection algorithm is composed of four sub-algorithms detecting (i) slow moving objects, (ii) gra...
B. Ugur Töreyin, A. Enis Çetin