This paper aims to design robust correlation-based watermarking methods for images. We rst present a model of watermark embedding and extracting processes and carry out their ana...
The problem of rollback recovery is traditionally approached using a model oriented to packet delivery. Instead, we introduce a model centered around complex sessions, and we expl...
We present an intrusion-detection tool aimed at protecting web servers, and justify why such a tool is needed. We describe several interesting features, such as the ability to run...
Abstract. Beth and Dai studied in their Eurocrypt paper [1] the relationship between linear complexity (that is, the length of the shortest Linear Feedback Shift Register that gene...
We argue that, despite a substantial number of proposed and existing new database systems, a suitable database system for software development environments and especially process-c...