Sciweavers

1323 search results - page 156 / 265
» Updatable Security Views
Sort
View
106
Voted
MCAM
2007
Springer
115views Multimedia» more  MCAM 2007»
15 years 8 months ago
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring
By reviewing DRMs up to now and two typical examples – AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical an...
Tiejun Huang
106
Voted
ICARIS
2004
Springer
15 years 8 months ago
Online Negative Databases
The benefits of negative detection for obscuring information are explored in the context of Artificial Immune Systems (AIS). AIS based on string matching have the potential for a...
Fernando Esponda, Elena S. Ackley, Stephanie Forre...
COMPSAC
2000
IEEE
15 years 7 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
ECOOP
2000
Springer
15 years 6 months ago
Ionic Types
Abstract. We are interested in the class of systems for which the satisfaction of code dependencies is a dynamic process rather than one which is determined purely at load-time. Ex...
Simon A. Dobson, Brian Matthews
AINA
2009
IEEE
15 years 5 months ago
Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks
Outlier detection in wireless sensor networks is essential to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga