Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Rafael Accorsi |
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Weidong Shi, Hsien-Hsin S. Lee |
Authentication Control Point and Its Implications For Secure Processor Design. |
MICRO |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Velik Bellemin, Tadashi Araragi |
CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack. |
DepCoS-RELCOMEX |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Alexander Zangerl |
Tamper-resistant Replicated Peer-to-Peer Storage using Hierarchical Signatures. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Jing Zhang, Anthony T. S. Ho |
Efficient Video Authentication for H.264/AVC. |
ICICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Xunzhan Zhu, Anthony T. S. Ho, Pina Marziliano |
Image Authentication and Restoration Using Irregular Sampling for Traffic Enforcement Applications. |
ICICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Dongdong Fu, Yun Q. Shi 0001, Wei Su 0001 |
Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
image splicing, Hilbert-Huang transform (HHT), support vector machine (SVM), characteristic functions |
11 | Hua Yuan, Xiao-Ping (Steven) Zhang |
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain. |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Yu-Feng Hsu, Shih-Fu Chang |
Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency. |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Nandakishore Ramaswamy, K. R. Rao 0001 |
Video authentication for H.264/AVC using digital signature standard and secure hash algorithm. |
NOSSDAV |
2006 |
DBLP DOI BibTeX RDF |
digital signature standard, secure hash, video authentication, H.264/AVC, multimedia security |
11 | Shay Gueron, Jean-Pierre Seifert |
Is It Wise to Publish Your Public RSA Keys? |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
Authenticated computing, Hardware attacks, Secure/Trusted boot, RSA, Fault attacks |
11 | Saraju P. Mohanty, Parthasarathy Guturu, Elias Kougianos, Nishikanta Pati |
A Novel Invisible Color Image Watermarking Scheme Using Image Adaptive Watermark Creation and Robust Insertion-Extraction. |
ISM |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Khaled E. A. Negm |
Design, Implementation and Testing of Mobile Agent Protection Mechanism for Manets. |
WEBIST (Selected Papers) |
2006 |
DBLP DOI BibTeX RDF |
Secure Mobile Transactions, Mobile Agent Protection, Business to Business Secure Transaction |
11 | Jianping Shi, Zhengjun Zhai |
Curvelet Transform for Image Authentication. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
Authentication, curvelet transform, ridgelet transform |
11 | Xianhai Zhang, Yongtian Yang, Yan Zhu 0010 |
A Secure Hierarchical Fragile Watermarking Method with Tamper Localization. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Dhruv Mahajan 0001, Ravi Ramamoorthi, Brian Curless |
A Theory of Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency. |
ECCV (4) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Zhifang Wang, Bian Yang, Xiamu Niu, Yijia Zhang |
A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Misung Cho, Seokryul Kim, Maenghee Sung, Giwon On |
3D Fingerprinting and Encryption Principle for Collaboration. |
AXMEDIS |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Daihyun Lim, Jae W. Lee, Blaise Gassend, G. Edward Suh, Marten van Dijk, Srinivas Devadas |
Extracting secret keys from integrated circuits. |
IEEE Trans. Very Large Scale Integr. Syst. |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Emin Martinian, Gregory W. Wornell, Brian Chen 0002 |
Authentication with distortion criteria. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin |
Fragile watermarking for authenticating 3-D polygonal meshes. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Yih-Chun Hu, Adrian Perrig, David B. Johnson 0001 |
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. |
Wirel. Networks |
2005 |
DBLP DOI BibTeX RDF |
ad hoc network routing, secure ad hoc network routing, Ariadne, mobile ad hoc network, secure routing |
11 | Shuo Chen 0001, Jun Xu 0003, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
Defeating Memory Corruption Attacks via Pointer Taintedness Detection. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Marco Milazzo, Giuseppe Pappalardo, Emiliano Tramontana, Giuseppe Ursino |
Handling run-time updates in distributed applications. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
distributed systems, adaptation, evolution, software evolution, separation of concerns, computational reflection, runtime adaptation |
11 | Min-Jen Tsai, Hsiao-Ying Hung |
Wavelet Transform Based Digital Watermarking for Image Authentication. |
ACIS-ICIS |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande |
Building Intrusion-Tolerant Secure Software. |
CGO |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Ismail Ahmad, Hong Tat Ewe |
A Model for Secure Knowledge Sharing. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Jianqing Ma, YiPing Zhong, Shiyong Zhang |
Frequency-hopping based Secure Schemes in Sensornets. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Bob Briscoe, Arnaud Jacquet, Carla Di Cairano-Gilfedder, Alessandro Salvatori, Andrea Soppera, Martin Koyabe |
Policing congestion response in an internetwork using re-feedback. |
SIGCOMM |
2005 |
DBLP DOI BibTeX RDF |
QoS, congestion, incentives, policing, characterisation |
11 | Keiichi Endo, Minoru Kawahara, Yutaka Takahashi 0001 |
A Distributed Architecture for Massively Multiplayer Online Services with Peer-to-Peer Support. |
Net-Con |
2005 |
DBLP DOI BibTeX RDF |
cheat-proof, peer-to-peer, interactive, real-time applications |
11 | Marco Aguzzi, Maria Grazia Albanesi, Marco Ferretti |
A Novel Watermarking Algorithm for Image Authentication: Robustness Against Common Attacks and JPEG2000 Compression. |
ICIAP |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Hongxia Jin, Ginger Myles, Jeffery Lotspiech |
Towards Better Software Tamper Resistance. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Chaw-Seng Woo, Jiang Du 0002, Binh Pham 0001, Hamud Ali Abdulkadir |
System Architecture Analysis of a Hybrid Watermarking Method. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Celia Li, Cungang Yang, Richard Cheung |
Key Management for Role Hierarchy in Distributed Systems. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Jing-Ming Guo |
Robust Watermarking with Kernels-Alternated Error Diffusion and Weighted Lookup Table in Halftone Images. |
ISM |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S. Wong 0001, Joo-Han Song |
Experimental comparisons between SAODV and AODV routing protocols. |
WMuNeP |
2005 |
DBLP DOI BibTeX RDF |
security, routing, wireless ad hoc networks, testbed |
11 | Shuiming Ye, Qibin Sun, Ee-Chien Chang |
Error resilient content-based image authentication over wireless channel. |
ISCAS (3) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Sheng Tang, Jin-Tao Li 0001, Yong-Dong Zhang 0001 |
Compact and Robust Image Hashing. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Xiangguo Li, Jianhua Yang, Zhaohui Wu 0001 |
An NFSv4-Based Security Scheme for NAS. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang |
Resisting Flooding Attacks in Ad Hoc Networks. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Songtao Xia, Ben Di Vito, César A. Muñoz |
Automated test generation for engineering applications. |
ASE |
2005 |
DBLP DOI BibTeX RDF |
model-checking, test case generation, predicate abstraction |
11 | Kripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno |
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Ching-Te Wang, Tung-Shou Chen, Wen-Hung Chao |
A New Detection Method for Tampered Audio Signals Based on Discrete Cosine Transformation. |
WSTST |
2005 |
DBLP DOI BibTeX RDF |
discrete cosine transformation, audio, frequency domain, MP3 |
11 | K. E. A. Negm |
Design, implementation and testing of mobile agent protection mechanism for MANETS. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Mahadevan Gomathisankaran, Akhilesh Tyagi |
Arc3D: A 3D Obfuscation Architecture. |
HiPEAC |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona |
A secure and flexible authentication system for digital images. |
Multim. Syst. |
2004 |
DBLP DOI BibTeX RDF |
Compression tolerance, JPEG, Image authentication |
11 | Kaushal Solanki, Noah Jacobsen, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran |
Robust image-adaptive data hiding using erasure and error correction. |
IEEE Trans. Image Process. |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Zhen Yao, Nasir M. Rajpoot |
Radon/ridgelet signature for image authentication. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Shengsheng Yu, Yuping Hu, Jingli Zhou |
Content-based watermarking scheme for image authentication. |
ICARCV |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Anthony T. S. Ho, Xunzhan Zhu, Jun Shen |
Authentication of biomedical images based on zero location watermarking. |
ICARCV |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Joseph Zambreno |
Design and Evaluation of an FPGA Architecture for Software Protection. |
FPL |
2004 |
DBLP DOI BibTeX RDF |
|
11 | John Page, Arkady B. Zaslavsky, Maria Indrawan |
Countering Agent Security Vulnerabilities using an Extended SENSE Schema. |
IAT |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Vasileios Pappas, Beichuan Zhang 0001, Andreas Terzis, Lixia Zhang 0001 |
Fault-Tolerant Data Delivery for Multicast Overlay Networks. |
ICDCS |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jongsoo Jang |
Design and Implementation of High-Performance Intrusion Detection System. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Pradeep K. Atrey, Wei-Qi Yan 0001, Ee-Chien Chang, Mohan S. Kankanhalli |
A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing. |
MMM |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Narges Ahmidi, Reza Safabakhsh |
A Novel DCT-based Approach for Secure Color Image Watermarking. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Austin Gilbert, Ajith Abraham, Marcin Paprzycki |
A System for Ensuring Data Integrity in Grid Environments. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
distributed trust, data integrity, reputation system, Grid security |
11 | Laurent Sourgen |
Testing a secure device: High coverage with very low observability. |
ITC |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Sandra Ring, David Esler, Eric Cole |
Self-healing mechanisms for kernel system compromises. |
WOSS |
2004 |
DBLP DOI BibTeX RDF |
fault tolerance, operating systems, kernel, self-healing systems |
11 | Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon |
Tamper Resistant Software by Integrity-Based Encryption. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Tamper Resistant Software, Security, Software Protection |
11 | Michael A. Caloyannides |
Digital "Evidence" and Reasonable Doubt. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
analog data, privacy, digital forensics, digital evidence, data entry |
11 | Christian S. Collberg, Ginger Myles, Andrew Huntwork |
Sandmark--A Tool for Software Protection Research. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. |
IPSN |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Kohei Muratani, Kokichi Sugihara |
Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis. |
IMA Conference on the Mathematics of Surfaces |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Hongxia Jin, Jeffery Lotspiech |
Forensic Analysis for Tamper Resistant Software. |
ISSRE |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Bassem Abdel-Aziz, Jean-Yves Chouinard |
On Perceptual Quality of Watermarked Images - An Experimental Approach. |
IWDW |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin |
Authentication of 3-D Polygonal Meshes. |
IWDW |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Henry D. Knowles, Dominique A. Winne, Cedric Nishan Canagarajah, David R. Bull |
Towards tamper detection and classification with robust watermarks. |
ISCAS (2) |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Haiping Lu, Alex C. Kot, Jun Cheng 0003 |
Secure data hiding in binary document images for authentication. |
ISCAS (3) |
2003 |
DBLP DOI BibTeX RDF |
|
11 | David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz |
Specifying and Verifying Hardware for Tamper-Resistant Software. |
S&P |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Joan Mir, Joan Borrell |
Protecting Mobile Agent Itineraries. |
MATA |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Yingwu Zhu, Yiming Hu |
SNARE: A Strong Security Scheme for Network-Attached Storage. |
SRDS |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Nachiketh R. Potlapally |
Optical Fingerprinting to Protect Data: A Proposal. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Christian S. Collberg, Clark D. Thomborson |
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. |
IEEE Trans. Software Eng. |
2002 |
DBLP DOI BibTeX RDF |
watermarking, Obfuscation, intellectual property protection, tamper-proofing |
11 | Matthias Jacob, Dan Boneh, Edward W. Felten |
Attacking an Obfuscated Cipher by Injecting Faults. |
Digital Rights Management Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Giampaolo Bella, Stefano Bistarelli |
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam |
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. |
IPDPS |
2002 |
DBLP DOI BibTeX RDF |
attack resistant, mobile agents, intrusion detection systems, DoS attacks |
11 | Edoardo Charbon, Ilhami Torunoglu |
Watermarking Techniques for Electronic Circuit Design. |
IWDW |
2002 |
DBLP DOI BibTeX RDF |
|
11 | David Mazières, Dennis E. Shasha |
Building secure file systems out of Byzantine storage. |
PODC |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung |
Observability Analysis - Detecting When Improved Cryptosystems Fail. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems |
11 | Hua Wang 0002, Jinli Cao, Yahiko Kambayashi |
Building consumer self-anonymity scalable payment protocol for Internet purchase. |
RIDE |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Ohad Rodeh, Kenneth P. Birman, Danny Dolev |
The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
security, Group communication |
11 | Andrew Z. Tirkel, Thomas E. Hall |
A Unique Watermark for Every Image. |
IEEE Multim. |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Andrew B. Kahng, John C. Lach, William H. Mangione-Smith, Stefanus Mantik, Igor L. Markov, Miodrag Potkonjak, Paul Tucker, Huijuan Wang, Gregory Wolfe |
Constraint-based watermarking techniques for design IP protection. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Liehua Me, Gonzalo R. Arce |
A class of authentication digital watermarks for secure multimedia communication. |
IEEE Trans. Image Process. |
2001 |
DBLP DOI BibTeX RDF |
|
11 | April Kwong, Michael Gertz 0001 |
Authentic Publication of XML Document Data. |
WISE (1) |
2001 |
DBLP DOI BibTeX RDF |
authentic data publication, XML, data integrity |
11 | Hyen-O Oh, Hyun Wook Kim, Jong Won Seok, Jin Woo Hong, Dae Hee Youn |
Transparent And Robust Audio Watermarking With A New Echo Embedding Technique. |
ICME |
2001 |
DBLP DOI BibTeX RDF |
|
11 | David Mazières, Dennis E. Shasha |
Don't Trust your File Server. |
HotOS |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Avishai Wool |
Key management for encrypted broadcast. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
pay-per-view, conditional access |
11 | Levente Buttyán, Jean-Pierre Hubaux |
Enforcing service availability in mobile ad-hoc WANs. |
MobiHoc |
2000 |
DBLP DOI BibTeX RDF |
|
11 | Hiroshi Yoshiura |
Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
11 | Bruce Christianson, Bruno Crispo, James A. Malcolm |
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
11 | Andrew Z. Tirkel, Thomas E. Hall |
Watermarking at point of origin. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
watermark, correlation, polynomial, array |
11 | Alexandr Seleznyov, Seppo Puuronen |
HIDSUR: A Hybrid Intrusion Detection System Based on Real-Time User Recognition. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
HIDSUR, hybrid intrusion detection system, real-time user recognition, computer system protection, anomaly detection, online learning, computer network management, unauthorized access |
11 | Neeran M. Karnik, Anand R. Tripathi |
A Security Architecture for Mobile Agents in Ajanta. |
ICDCS |
2000 |
DBLP DOI BibTeX RDF |
|
11 | Michel Abdalla, Yuval Shavitt, Avishai Wool |
Towards Making Broadcast Encryption Practical. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
11 | Nikos Nikolaidis 0001, Ioannis Pitas |
Digital Image Watermarking: An Overview. |
ICMCS, Vol. 1 |
1999 |
DBLP DOI BibTeX RDF |
watermarking, copyright protection |
11 | Xiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto |
Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. |
CIA |
1999 |
DBLP DOI BibTeX RDF |
|
11 | Arianna Arona, Danilo Bruschi, Emilia Rosti |
Adding Availability to Log Services of Untrusted Machines. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
security, fault-tolerance, availability, log files |
11 | Tomas Sander, Christian F. Tschudin |
Protecting Mobile Agents Against Malicious Hosts. |
Mobile Agents and Security |
1998 |
DBLP DOI BibTeX RDF |
|