Sciweavers

1323 search results - page 77 / 265
» Updatable Security Views
Sort
View
OOPSLA
2001
Springer
14 years 2 months ago
An On-the-Fly Reference Counting Garbage Collector for Java
Reference counting is not naturally suitable for running on multiprocessors. The update of pointers and reference counts requires atomic and synchronized operations. We present a ...
Yossi Levanoni, Erez Petrank
ICIP
2000
IEEE
14 years 11 months ago
Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking
The paper covers a method of allowing a client to browse an image to examine it in detail, while making it difficult to steal. It differs from invisible watermarking methods in th...
Cormac Herley
COLING
2008
13 years 11 months ago
Online-Monitoring of Security-Related Events
This paper presents a fully operational real-time event extraction system which is capable of accurately and efficiently extracting violent and natural disaster events from vast a...
Martin Atkinson, Jakub Piskorski, Bruno Pouliquen,...
SUTC
2006
IEEE
14 years 4 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
TCC
2005
Springer
166views Cryptology» more  TCC 2005»
14 years 3 months ago
Adaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Ran Canetti, Shai Halevi, Jonathan Katz