Sciweavers

180 search results - page 25 / 36
» An Information-Theoretic Model for Steganography
Sort
View
TCOM
2008
82views more  TCOM 2008»
13 years 7 months ago
Detecting the number of signals in wireless DS-CDMA networks
In this paper, a new information theoretic algorithm is proposed for signal enumeration in DS-CDMA networks. The approach is based on the predictive description length (PDL) of the...
Shahrokh Valaee, Shahram Shahbazpanahi
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
13 years 11 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
14 years 28 days ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak
NC
1998
140views Neural Networks» more  NC 1998»
13 years 8 months ago
Recurrent Neural Networks with Iterated Function Systems Dynamics
We suggest a recurrent neural network (RNN) model with a recurrent part corresponding to iterative function systems (IFS) introduced by Barnsley 1] as a fractal image compression ...
Peter Tiño, Georg Dorffner
MSWIM
2003
ACM
14 years 20 days ago
Markov-based modeling of wireless local area networks
Errors introduced by a wireless medium are more frequent and profound than contemporary wired media. Some of these errors, which are not corrected by the physical layer, result in...
Syed A. Khayam, Hayder Radha