Sciweavers

ISW
2000
Springer
14 years 8 days ago
Classification of Authentication Protocols: A Practical Approach
We propose a simple classification method for public-key based authentication protocols, which consists of identifying several basic properties leading to a large number of generic...
DongGook Park, Colin Boyd, Ed Dawson
ISW
2000
Springer
14 years 8 days ago
A Signcryption Scheme Based on Integer Factorization
Abstract. Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower ...
Ron Steinfeld, Yuliang Zheng
ISW
2000
Springer
14 years 8 days ago
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling
Abstract. Two robust spatial-domain watermarking algorithms for image copyright protection are described in this paper. The first one is robust against compression, filtering and c...
Francesc Sebé, Josep Domingo-Ferrer, Jordi ...
ISW
2000
Springer
14 years 8 days ago
Performance Analysis of Secure Web Server Based on SSL
Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
Xiaodong Lin, Johnny W. Wong, Weidong Kou
ISW
2000
Springer
14 years 8 days ago
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients
Generally, low frequency domain may be useful to embed a watermark in an image. However, if a watermark is embedded into low frequency components, blocking effects may occur in the...
Minoru Kuribayashi, Hatsukazu Tanaka
ISW
2000
Springer
14 years 8 days ago
Towards a Practical Secure Framework for Mobile Code Commerce
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
Gaël Hachez, Laurent Den Hollander, Mehrdad J...
SIGIR
1998
ACM
14 years 9 days ago
Automatic Acquisition of Phrasal Knowledge for English-Chinese Bilingual Information Retrieval
Extraction of phrasal knowledge, such as proper names, domain-specific keyphrases and lexical templates from a domain-specific text collection are significant for developing effec...
Ming-Jer Lee, Lee-Feng Chien
IEAAIE
2000
Springer
14 years 9 days ago
Information Management and Process Improvement Using Data Mining Techniques
This paper describes a computer component manufacturing scenario which concentrates on the application of data mining techniques to improve information management and process impr...
W. M. Gibbons, Mervi Ranta, T. M. Scott, Martti M&...
SIGIR
2010
ACM
14 years 9 days ago
Evaluating whole-page relevance
Whole page relevance defines how well the surface-level representation of all elements on a search result page and the corresponding holistic attributes of the presentation respon...
Peter Bailey, Nick Craswell, Ryen W. White, Liwei ...