|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7090 occurrences of 2819 keywords
|
|
|
Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Andrew A. Chien, Jay H. Byun |
Safe and Protected Execution for the Morph/AMRM Reconfigurable Processor. |
FCCM |
1999 |
DBLP DOI BibTeX RDF |
Multiprocess Protection, Process isolation, Machine Virtualization, Adaptive Computing, Reconfigurable Processor |
22 | Dixie B. Baker, Robert M. Barnhart, T. T. Buss |
PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
PCASSO, Patient Centered Access to Secure Systems Online, healthcare domain, patient privacy protection, life-critical information, patient empowerment, safety, security of data, Internet access, security technology, sensitive information |
22 | Gabriele Gianini, Ernesto Damiani |
A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Si Choon Noh, Dong Chun Lee, Kuinam J. Kim |
Multi-level Protection Building for Virus Protection Infrastructure. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Olivier Bonaventure, Clarence Filsfils, Pierre François |
Achieving sub-50 milliseconds recovery upon BGP peering link failures. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
fast recovery, routing, BGP, computer network reliability |
22 | John A. Bullinaria |
The effect of learning on life history evolution. |
GECCO |
2007 |
DBLP DOI BibTeX RDF |
life histories, learning, evolution, artificial life |
22 | Krishanthmohan Ratnam, Luying Zhou, Mohan Gurusamy |
Efficient multi-layer operational strategies for survivable IP-over-WDM networks. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Luísa Jorge, Teresa Gomes |
Survey of Recovery Schemes in MPLS Networks. |
DepCoS-RELCOMEX |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Rémy Haemmerlé, François Fages |
Modules for Prolog Revisited. |
ICLP |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Nicholas Paul Sheppard, Reihaneh Safavi-Naini |
Protecting Privacy with the MPEG-21 IPMP Framework. |
Privacy Enhancing Technologies |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Edward T. Chow |
Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured? |
WETICE |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Zhe-Ming Lu, Dianguo Xu 0001, Sheng-He Sun |
Multipurpose image watermarking algorithm based on multistage vector quantization. |
IEEE Trans. Image Process. |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Franco Frattolillo, Salvatore D'Onofrio |
An Effective and Dynamically Extensible DRM Web Platform. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Olivier Bonaventure, Clarence Filsfils, Pierre François |
Achieving sub-50 milliseconds recovery upon BGP peering link failures. |
CoNEXT |
2005 |
DBLP DOI BibTeX RDF |
IP tunnels, MPLS VPN, fast restoration, border gateway protocol (BGP) |
22 | Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki |
Towards Modeling Wireless Location Privacy. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Reinhard Seyer, Christian Siemers, Rainer Falsett, Klaus H. Ecker, Harald Richter 0001 |
Robust Partitioning for Reliable Real-Time Systems. |
IPDPS |
2004 |
DBLP DOI BibTeX RDF |
Mechatronic System, Time Supervision, Reliability, Distributed Real-Time Systems, Imprecise Computation |
22 | Cheng-Ching Huang, Hsueh-Ming Hang, Hsiang-Cheh Huang |
MPEG IPMP Concepts and Implementation. |
IEEE Pacific Rim Conference on Multimedia |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Mihaela van der Schaar, Hayder Radha |
Unequal packet loss resilience for fine-granular-scalability video. |
IEEE Trans. Multim. |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Hoi Chang, Mikhail J. Atallah |
Protecting Software Code by Guards. |
Digital Rights Management Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Mariana Dumitrescu, Toader Munteanu |
Fuzzy Probability and Power System Safety. |
Fuzzy Days |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Izuru Kume |
An Object-Oriented Analysis and Design Approach for Safe Object Sharing. |
ICECCS |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Fritz Hohl |
A Framework to Protect Mobile Agents by using Reference States. |
ICDCS |
2000 |
DBLP DOI BibTeX RDF |
|
22 | John T. Robinson, Murthy V. Devarakonda |
Note on a Problem with Reed and Long's FBR Results. |
ACM SIGOPS Oper. Syst. Rev. |
1997 |
DBLP DOI BibTeX RDF |
|
22 | Gilles Brassard, Moti Yung |
One-Way Group Actions. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
21 | Pierangela Samarati, Sabrina De Capitani di Vimercati |
Data protection in outsourcing scenarios: issues and directions. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
privacy, access control, encryption, confidentiality, data protection, data outsourcing, data fragmentation |
21 | Jibang Liu, Karthik Kumar, Yung-Hsiang Lu |
Tradeoff between energy savings and privacy protection in computation offloading. |
ISLPED |
2010 |
DBLP DOI BibTeX RDF |
image retrieval, steganography, energy saving, privacy protection, computation offloading |
21 | Ruirui C. Huang, Daniel Y. Deng, G. Edward Suh |
Orthrus: efficient software integrity protection on multi-cores. |
ASPLOS |
2010 |
DBLP DOI BibTeX RDF |
replication-aware architecture, software diversity and redundancy, software security, multi-core architecture, memory protection |
21 | Cheng-Yaw Low, Andrew Beng Jin Teoh, Tee Connie |
Fusion of LSB and DWT Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
Biometric watermarking, offline handwritten signature, copyright protection |
21 | Vishnu Naresh Boddeti, Fei Su, B. V. K. Vijaya Kumar |
A Biometric Key-Binding and Template Protection Framework Using Correlation Filters. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
Key-Binding, Face Recognition, Biometrics, Encryption, Template Protection, Correlation Filters |
21 | Vladimir Kotenko, Alexey Evseev, Stas Kotenko, Konstantin E. Rumyantsev |
New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
effectiveness of the audio information protection, virtual adaptive scrambling, virtual scrambling, redundancy, information security, legibility, scrambling |
21 | Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar, Samar Sen-Sarma |
An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking. |
SBCCI |
2009 |
DBLP DOI BibTeX RDF |
intellectual property protection (IPP), watermarking, encryption, decryption |
21 | Yixin Diao, Xiaolei Hu, Asser N. Tantawi, Haishan Wu |
An adaptive feedback controller for SIP server memory overload protection. |
ICAC |
2009 |
DBLP DOI BibTeX RDF |
memory overload protection, modeling, adaptive control, workload characterization |
21 | Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch 0001, Arjan Kuijper |
A Security Analysis of Biometric Template Protection Schemes. |
ICIAR |
2009 |
DBLP DOI BibTeX RDF |
Biometric encryption, biometric template protection, correlation, attacks, security analysis |
21 | Carl E. Landwehr |
Results of Workshops on Privacy Protection Technologies. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
privacy protection technologies, intelligence community, strategies, workshop |
21 | Daniel J. Weitzner |
Beyond Secrecy: New Privacy Protection Strategies for Open Information Spaces. |
IEEE Internet Comput. |
2007 |
DBLP DOI BibTeX RDF |
digital privacy protection, Technology and Society, cryptography |
21 | Avesh Kumar Agarwal, Wenye Wang |
On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
quality of protection, quality of service, performance analysis, security protocols, mobile IP, wireless local area networks |
21 | Nizar Bouabdallah, Bruno Sericola |
Introducing a Relative Priority for the Shared-Protection Schemes. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
performance analysis, Optical networks, protection |
21 | Julian Ligertwood, Margaret Jackson |
Transborder Data Protection and the Effects on Business and Government. |
HCI (11) |
2007 |
DBLP DOI BibTeX RDF |
EU, government, law, India, data protection, business, Australia |
21 | Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Choon Kwon, Eunkyoung Jee, Kwang Yong Koh |
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System. |
SAFECOMP |
2007 |
DBLP DOI BibTeX RDF |
Software Safety Analysis, Software FTA, Software HAZOP, Function Block Diagram, Nuclear Reactor Protection System |
21 | Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis |
A CBK for Information Security and Critical Infrastructure Protection. |
World Conference on Information Security Education |
2007 |
DBLP DOI BibTeX RDF |
Common Body of Knowledge (CBK), Academic Curriculum, Academic Programme, Critical Infrastructure Protection |
21 | Helen J. Wang, Xiaofeng Fan, Jon Howell, Collin Jackson |
Protection and communication abstractions for web browsers in MashupOS. |
SOSP |
2007 |
DBLP DOI BibTeX RDF |
multi-principal OS, security, communications, web, abstractions, protection, browser, same-origin policy |
21 | Chen Yongxi |
Crisis of personal data protection during the construction of e-government: reaction and limits of Hong Kong privacy laws. |
ICEGOV |
2007 |
DBLP DOI BibTeX RDF |
legal deficiency, personal data protection, privacy law, e-government, Hong Kong |
21 | Eun Young Choi, Su-Mi Lee, Dong Hoon Lee 0001 |
Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
RFID-tagged Banknotes, Self-updating, Privacy protection |
21 | Yi Ren, Min Luo, Zukai Tang, Lingqing Ye |
A Composite Privacy Protection Model. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Privacy Data Model, Privacy Database, Deputy Mechanism, Privacy Protection |
21 | George O. M. Yee |
A privacy controller approach for privacy protection in web services. |
SWS |
2007 |
DBLP DOI BibTeX RDF |
privacy controller, user privacy policy, web services, privacy protection |
21 | Soo-Young Kang, Im-Yeong Lee |
Privacy Protection Scheme of RFID Using Random Number. |
PAKDD Workshops |
2007 |
DBLP DOI BibTeX RDF |
RFID, Privacy Protection, Random Number |
21 | Jung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo, Jen-Chieh Chang |
Robust Multi-scale Full-Band Image Watermarking for Copyright Protection. |
IEA/AIE |
2007 |
DBLP DOI BibTeX RDF |
Distributed discrete wavelet transformation, Image attack, Data hiding and recovery, Image processing, Singular value decomposition, Digital watermark, Copyright protection |
21 | Yong-Joon Park, Zhao Zhang, Gyungho Lee |
Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks. |
IEEE Micro |
2006 |
DBLP DOI BibTeX RDF |
Microarchitectural protection, stack-based, buffer overflow, RAS |
21 | Shuting Xu, Jun Zhang 0001, Dianwei Han, Jie Wang 0008 |
Singular value decomposition based data distortion strategy for privacy protection. |
Knowl. Inf. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Data distortion, Security, Data mining, Singular value decomposition, Privacy protection |
21 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar |
Rights Protection for Discrete Numeric Streams. |
IEEE Trans. Knowl. Data Eng. |
2006 |
DBLP DOI BibTeX RDF |
Rights protection, discrete streams, sensor networks, watermarking |
21 | M. Ali Akcayol 0001 |
Application of Fuzzy Logic Controlled Cathodic Protection on Iraq-Turkey Crude Oil Pipeline. |
Appl. Intell. |
2006 |
DBLP DOI BibTeX RDF |
cathodic protection, fuzzy control, microcontroller |
21 | Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhang, San Nguyen, Hsien-Hsin S. Lee |
A low-cost memory remapping scheme for address bus protection. |
PACT |
2006 |
DBLP DOI BibTeX RDF |
address bus leakage protection, secure processor |
21 | Hans Georg Schaathun |
On Watermarking/Fingerprinting for Copyright Protection. |
ICICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
collusion-secure fingerprinting, watermarking, error-correcting codes, copyright protection, soft-decision decoding |
21 | Maurizio Murroni |
Broadcasting of digital cimema streams over wireless channels: a power-based unequal error protection approach. |
MobiMedia |
2006 |
DBLP DOI BibTeX RDF |
wavelet transmultiplexing, JPEG2000, wireless channel, unequal error protection, digital cinema |
21 | Dulce B. Ponceleon, Julian A. Cerruti |
Multimedia content protection. |
ACM Multimedia |
2006 |
DBLP DOI BibTeX RDF |
AACS, CPRM, watermarking, encryption, tracing, revocation, broadcast encryption, content protection, piracy |
21 | Shang-Lin Hsieh, Hsuan-Chieh Huang, I-Ju Tsai |
A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
fingerprint enhancement, digital watermarking, discrete wavelet transform, copyright protection, secret sharing scheme |
21 | Daniel Socek, Michal Sramka, Oge Marques, Dubravko Culibrk |
An improvement to a biometric.based multimedia content protection scheme. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
multimedia content protection, security, authentication, biometrics, digital rights management |
21 | Dragan Jevtic, Marijan Kunstic, Stjepan Matijasevic |
Load Protection Model Based on Intelligent Agent Regulation. |
KES (1) |
2006 |
DBLP DOI BibTeX RDF |
load protection, reinforcement learning, intelligent agent |
21 | Khaled E. A. Negm |
Design, Implementation and Testing of Mobile Agent Protection Mechanism for Manets. |
WEBIST (Selected Papers) |
2006 |
DBLP DOI BibTeX RDF |
Secure Mobile Transactions, Mobile Agent Protection, Business to Business Secure Transaction |
21 | Mihai Budiu, Úlfar Erlingsson, Martín Abadi |
Architectural support for software-based protection. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
control-flow integrity, software fault isolation, security, control-flow graph, hardware support, memory protection, binary rewriting |
21 | Josep Maria Mateo-Sanz, Josep Domingo-Ferrer, Francesc Sebé |
Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata. |
Data Min. Knowl. Discov. |
2005 |
DBLP DOI BibTeX RDF |
information loss measures, privacy, database security, statistical disclosure control, microdata protection |
21 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar |
Rights Protection for Categorical Data. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
Rights protection, watermarking, information hiding, categorical data, relational data |
21 | Yimei Guo |
A comment on chinese legal environment of online copyright protection. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
Chinese legal environment of online copyright protection, internet piracy, corporation |
21 | Larry Huston, Rahul Sukthankar, Yan Ke |
Evaluating keypoint methods for content-based copyright protection of digital images. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
descriptor matching, keypoint method evaluation, content-based copyright protection, digital image encoding, nearest-neighbor indexing scheme, image transformation |
21 | Kenichi Yabuta, Hitoshi Kitazawa, Toshihisa Tanaka |
A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects. |
PCM (1) |
2005 |
DBLP DOI BibTeX RDF |
security camera, JPEG encoding, watermarking, Privacy protection |
21 | Alessandra Carbone, Chengde Mao, Pamela E. Constantinou, Baoquan Ding, Jens Kopatsch, William B. Sherman, Nadrian C. Seeman |
3D Fractal DNA Assembly from Coding, Geometry and Protection. |
Nat. Comput. |
2004 |
DBLP DOI BibTeX RDF |
coding of times, DNA 3D assembly, DNA protection, geometry of tiles, Sierpinski cube, tiling, DNA nanotechnology, DNA molecules |
21 | Ziad Sakr, Nicolas D. Georganas |
A MPEG-4 XMT Scene Structure Algorithm for Authentication and Copyright Protection. |
RIDE |
2004 |
DBLP DOI BibTeX RDF |
Authentication, digital watermarking, protection, XMT, BIFS |
21 | Florian Pestoni, Clemens Drews |
eXtensible content protection. |
ACM Multimedia |
2003 |
DBLP DOI BibTeX RDF |
home networking, peer-to-peer computing, digital media, content protection |
21 | David Megías 0001, Jordi Herrera-Joancomartí, Julià Minguillón |
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
Frequency domain methods, Copyright protection, Audio watermarking |
21 | Ming-Dou Ker, Chien-Hui Chuang, Kuo-Chun Hsu, Wen-Yu Lo |
ESD Protection Design for Mixed-Voltage I/O Circuit with Substrate-Triggered Technique in Sub-Quarter-Micron CMOS Process. |
ISQED |
2002 |
DBLP DOI BibTeX RDF |
ESD, ESD protection circuit, substrate-triggered technique |
21 | Dimitris K. Tsolis, George K. Tsolis, Emmanouil G. Karatzas, Theodore S. Papatheodorou |
Copyright protection and management and a web based library for digital images of the Hellenic cultural heritage. |
Virtual Reality, Archeology, and Cultural Heritage |
2001 |
DBLP DOI BibTeX RDF |
digital web archives, databases, information systems, watermarking, copyright protection, java applets |
21 | Sylvia B. Encheva, Gérard D. Cohen |
Partially Identifying Codes for Copyright Protection. |
AAECC |
2001 |
DBLP DOI BibTeX RDF |
Secure frameproof codes, designs, copyright protection |
21 | Yang-Koo Kang, Moon-Hyun Kim |
Real-Time Fingerprints Recognition Mechanism-Based on Digital Contents Protection System for Interaction on Web. |
PRDC |
2001 |
DBLP DOI BibTeX RDF |
Digital Contents protection, Digital Rights Providers, Fingerprint Recognition Mechanism, DRM |
21 | Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyuan Wang |
Practical Key Distribution Schemes for Channel Protection. |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
channel protection, network security and key distribution scheme, Pay-per-view |
21 | Jaap Haitsma, Michiel van der Veen, Ton Kalker, Fons Bruekers |
Audio watermarking for monitoring and copy protection. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
broadcast monitoring, audio, copy protection, watermark embedding, watermark detection |
21 | Rogers Alunge |
Consolidating the Right to Data Protection in the Information Age: A Comparative Appraisal of the Adoption of the OECD (Revised) Guidelines into the EU GDPR, the Ghanaian Data Protection Act 2012 and the Kenyan Data Protection Act 2019. |
InterSol |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Fulong Chen 0002, Yonglong Luo, Ji Zhang 0001, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang |
An infrastructure framework for privacy protection of community medical internet of things - Transmission protection, storage protection and access control. |
World Wide Web |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Sarah Ellis, Charles Oppenheim |
Legal issues for information professionals, Part III: Data protection and the media - background to the Data Protection Act 1984 and the EC Draft Directive on Data Protection. |
J. Inf. Sci. |
1993 |
DBLP DOI BibTeX RDF |
|
21 | Frank Hearl |
Using Risk Analysis to Guide Worker Protection. |
EnviroInfo (2) |
2009 |
DBLP BibTeX RDF |
|
20 | Dan Lin 0001, Anna Cinzia Squicciarini |
Data protection models for service provisioning in the cloud. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
cloud computing, data privacy |
20 | Zhiguo Wan, Kui Ren 0001, Bo Zhu 0001, Bart Preneel, Ming Gu 0001 |
Anonymous user communication for privacy protection in wireless metropolitan mesh networks. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
anonymous routing, information security, wireless mesh networks |
20 | Jongeun Lee, Aviral Shrivastava |
Compiler-managed register file protection for energy-efficient soft error reduction. |
ASP-DAC |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Thomas H. Morris, V. S. S. Nair |
Encryption Key Protection for Private Computing on Public Platforms. |
PerCom Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ying Li, Guifen Zhao, Tong Liu |
Research on Data Protection System in Computer Network. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ghassan Jabbour, Daniel A. Menascé |
The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Chen 0003 |
Noise Injection for Search Privacy Protection. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Thibault Cholez, Isabelle Chrisment, Olivier Festor |
Evaluation of Sybil Attacks Protection Schemes in KAD. (PDF / PS) |
AIMS |
2009 |
DBLP DOI BibTeX RDF |
security, DHT, P2P networks, Sybil attack, KAD, defense |
20 | Maria Fresia, Fabio Lavagetto |
Determination of Optimal Distortion-Based Protection in Progressive Image Transmission: A Heuristic Approach. |
IEEE Trans. Image Process. |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Amir Askarian, Yuxiang Zhai, Suresh Subramaniam 0001, Yvan Pointurier, Maïté Brandt-Pearce |
Protection and Restoration from Link Failures in DWDM Networks: A Cross-Layer Study. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Shangping Ren, Kevin A. Kwiat |
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
legacy control systems, behavior observation, feedback loop |
20 | Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo |
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
RFID security and privacy |
20 | Muhammad S. Javed, Krishnaiyan Thulasiraman, Guoliang Xue |
Logical Topology Design for IP-over-WDM Networks: A Hybrid Approach for Minimum Protection Capacity. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Rohit Chadha, Carl A. Gunter, José Meseguer 0001, Ravinder Shankesi, Mahesh Viswanathan 0001 |
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. |
FMOODS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Walter Grote, Alvaro Arenas, Alejandra Zapata |
NetFailPAC: A Single Failure Protection Algorithm with QoS Provision for Optical WDM Networks. |
ICONS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Da-Wei Wang 0004, Churn-Jung Liau, Tsan-sheng Hsu |
Granulation as a Privacy Protection Mechanism. |
Trans. Rough Sets |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington |
Program Fragmentation as a Metamorphic Software Protection. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Neele von Deetzen, Sara Sandberg |
Design of Unequal Error Protection LDPC Codes for Higher Order Constellations. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Salima Hacini, Zizette Boufaïda 0001, Haoua Cheribi |
Mobile Agent Protection in E-Business Application A Dynamic Adaptability Based Approach. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
environment key, trust, mobile agent security, malicious host |
20 | Tim Güneysu, Bodo Möller, Christof Paar |
New Protection Mechanisms for Intellectual Property in Reconfigurable Logic. |
FCCM |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Zhen Xiao, Xiaofeng Meng 0001, Jianliang Xu |
Quality Aware Privacy Protection for Location-Based Services. |
DASFAA |
2007 |
DBLP DOI BibTeX RDF |
QoS, Privacy, Location-based Services |
|
|