Sciweavers

230 search results - page 11 / 46
» host 2009
Sort
View
IEEEIAS
2009
IEEE
14 years 2 months ago
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation
: This paper proposes a new watermarking method for detecting image tampering. First, an authentication number is created using a pair of watermark pixels as the coefficients of a ...
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng...
ESORICS
2009
Springer
14 years 8 months ago
The Coremelt Attack
Current Denial-of-Service (DoS) attacks are directed towards a specific victim. The research community has devised several countermeasures that protect victim hosts against undesir...
Ahren Studer, Adrian Perrig
WETICE
2009
IEEE
14 years 2 months ago
Search Optimizations in Structured Peer-to-Peer Systems
Abstract—DHT systems are structured overlay networks capable of using P2P resources as a scalable platform for very large data storage applications. However, their efficiency ex...
Nuno Lopes, Carlos Baquero
WEBI
2009
Springer
14 years 2 months ago
The Geographical Life of Search
This article describes a geographical study on the usage of a search engine, focusing on the traffic details at the level of countries and continents. The main objective is to un...
Ricardo A. Baeza-Yates, Christian Middleton, Carlo...
CSE
2009
IEEE
13 years 11 months ago
A Unified Approach to Intra-domain Security
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to sec...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta