-
4
-
-
78650451034
-
Privacy by data provenance with digital watermarking-A proof-of-concept implementation for medical services with electronic health records
-
Darmstadt, Germany, 2010;. DOI: 10.1109/IIHMSP.2010.130
-
Tharaud J, Wohlgemuth S, Echizen I, Sonehara N, Muller G, Lafourcade P, Privacy by data provenance with digital watermarking-A proof-of-concept implementation for medical services with electronic health records. Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Darmstadt, Germany, 2010; 510-513. DOI: 10.1109/IIHMSP.2010.130.
-
Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
, pp. 510-513
-
-
Tharaud, J.1
Wohlgemuth, S.2
Echizen, I.3
Sonehara, N.4
Muller, G.5
Lafourcade, P.6
-
5
-
-
77956356055
-
Trusted cloud computing with secure resources and data coloring
-
DOI: 10.1109/MIC.2010.86
-
Hwang K, Li D, Trusted cloud computing with secure resources and data coloring. IEEE Internet Computing 2010; 14 (5): 14-22. DOI: 10.1109/MIC.2010.86.
-
(2010)
IEEE Internet Computing
, vol.14
, Issue.5
, pp. 14-22
-
-
Hwang, K.1
Li, D.2
-
7
-
-
68249129760
-
Above the clouds: A Berkeley view of cloud computing
-
EECS Department, University of California, Berkeley, February
-
Armbrust M, Above the clouds: A Berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, February 2009.
-
(2009)
Technical Report UCB/EECS-2009-28
-
-
Armbrust, M.1
-
10
-
-
64249107623
-
Recent advances in multimedia information system security
-
Lian S, Kanellopoulos D, Ruffo G, Recent advances in multimedia information system security. Informatica (Slovenia) 2009; 33 (1): 3-24.
-
(2009)
Informatica (Slovenia)
, vol.33
, Issue.1
, pp. 3-24
-
-
Lian, S.1
Kanellopoulos, D.2
Ruffo, G.3
-
11
-
-
77950601673
-
Cloud security with virtualized defense and reputation-based trust management
-
Chengdu, China, 2009;. DOI: 10.1109/DASC.2009.149
-
Hwang K, Kulkareni S, Hu Y, Cloud security with virtualized defense and reputation-based trust management. Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC '09), Chengdu, China, 2009; 717-722. DOI: 10.1109/DASC.2009.149.
-
Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC '09)
, pp. 717-722
-
-
Hwang, K.1
Kulkareni, S.2
Hu, Y.3
-
12
-
-
0002779304
-
Privacy, Information Technology, and Health Care
-
Rindfleisch TC, Privacy, information technology, and health care. Communications of the ACM 1997; 40 (8): 93-100. (Pubitemid 127440144)
-
(1997)
Communications of the ACM
, vol.40
, Issue.8
, pp. 93-100
-
-
Rindfleisch, T.C.1
-
13
-
-
84858080748
-
-
Identity Theft Resource Center
-
Identity Theft Resource Center. Data breaches, 2007-2009.
-
(2007)
Data Breaches
-
-
-
15
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation-Tools for software protection
-
Collberg C, Thomborson C, Watermarking, tamper-proofing, and obfuscation-Tools for software protection. IEEE Transactions on Software Engineering 2002; 28 (8): 735-746.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
16
-
-
34547374329
-
Recognition in software watermarking
-
DOI 10.1145/1178766.1178776, Proceedings of the ACM International Workshop on Multimedia Contents Protection and Security, MCPS 2006
-
Zhu W, Thomborson C, Recognition in software watermarking. First ACM International Workshop on Content Protection and Security (MCPS 06). ACM: New York, NY, U.S.A., 2006; 29-36. DOI:. (Pubitemid 47154930)
-
(2006)
Proceedings of the ACM International Multimedia Conference and Exhibition
, pp. 29-36
-
-
Zhu, W.1
Thomborson, C.2
-
19
-
-
77249155940
-
-
Addison-Wesley Professional: Boston, MA, U.S.A
-
Collberg C, Nagra J, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley Professional: Boston, MA, U.S.A., 2009.
-
(2009)
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
-
-
Collberg, C.1
Nagra, J.2
-
20
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Monterey, CA, U.S.A., IEEE Computer Society: Washington, DC, U.S.A
-
Liu L, Yu ESK, Mylopoulos J, Security and privacy requirements analysis within a social setting. Eleventh IEEE International Conference on Requirements Engineering (RE 2003), Monterey, CA, U.S.A., IEEE Computer Society: Washington, DC, U.S.A., 2003; 151-161.
-
(2003)
Eleventh IEEE International Conference on Requirements Engineering (RE 2003)
, pp. 151-161
-
-
Liu, L.1
Yu, E.S.K.2
Mylopoulos, J.3
-
21
-
-
77954700247
-
A framework for system security
-
In, Stamp M. Stavroulakis P. (eds). Springer: Berlin, DOI: 10.1007/978-3-642-04117-4-1
-
Thomborson C, A framework for system security. In Handbook of Information and Communication Security, Stamp M, Stavroulakis P, (eds). Springer: Berlin, 2010; 3-20. DOI: 10.1007/978-3-642-04117-4-1.
-
(2010)
Handbook of Information and Communication Security
, pp. 3-20
-
-
Thomborson, C.1
-
22
-
-
77749304227
-
A security model for VoIP steganography
-
DOI: 10.1109/MINES.2009.227
-
Yu Z, Thomborson C, Wang C, Fu J, Wang J, A security model for VoIP steganography. Multimedia Information Networking and Security 2009; 1: 35-40. DOI: 10.1109/MINES.2009.227.
-
(2009)
Multimedia Information Networking and Security
, vol.1
, pp. 35-40
-
-
Yu, Z.1
Thomborson, C.2
Wang, C.3
Fu, J.4
Wang, J.5
-
26
-
-
33645758539
-
Software watermarking via opaque predicates: Implementation, analysis, and attacks
-
DOI 10.1007/s10660-006-6955-z
-
Myles G, Collberg C, Software watermarking via opaque predicates: Implementation, analysis, and attacks. Electronic Commerce Research 2006; 6 (2): 155-171. (Pubitemid 43560168)
-
(2006)
Electronic Commerce Research
, vol.6
, Issue.2
, pp. 155-171
-
-
Myles, G.1
Collberg, C.2
|