Sciweavers

18374 search results - page 48 / 3675
» Applications for data hiding
Sort
View
IACR
2011
127views more  IACR 2011»
12 years 9 months ago
Oblivious RAM with O((log N)^3) Worst-Case Cost
Oblivious RAM (O-RAM) is a useful primitive that allows a client to hide its data access patterns from an untrusted server in storage outsourcing applications. This paper proposes...
Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Ming...
AICCSA
2005
IEEE
91views Hardware» more  AICCSA 2005»
14 years 3 months ago
Secure transmission of sensitive data using multiple channels
A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem a...
Abdelhamid S. Abdelhamid, Ahmed A. Belal
COMPUTER
2002
89views more  COMPUTER 2002»
13 years 9 months ago
A Pattern for Softcoded Values
rs use models or abstractions that hide low-level implementation details. Various kinds of representations such as data models, state-transition models, and dataflow models can hel...
Michael R. Blaha, Cheryl Smith
ICIP
2002
IEEE
14 years 11 months ago
Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information
The theoretical foundations of data hiding have been revealed by formulating the problem as message communication over a noisy channel, i.e. the host document. In light of this de...
Christine Guillemot, Gaëtan Le Guelvouit, St&...
HPCA
1999
IEEE
14 years 1 months ago
Impulse: Building a Smarter Memory Controller
Impulse is a new memory system architecture that adds two important features to a traditional memory controller. First, Impulse supports application-specific optimizations through...
John B. Carter, Wilson C. Hsieh, Leigh Stoller, Ma...