Sciweavers

12183 search results - page 16 / 2437
» Computers under Attacks!
Sort
View
ICMCS
2006
IEEE
145views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Confronting the Synchronization Problem of Semantic Region Under Geometric Attacks
In this paper, an affine invariant watermarking scheme, robust to geometric attacks, is proposed and applied to face regions. Initially, face regions are unsupervisedly extracted ...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
HYBRID
2009
Springer
14 years 4 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
14 years 3 months ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart
ICIP
2006
IEEE
14 years 11 months ago
On the Optimal Structure of Watermark Decoders Under Desynchronization Attacks
Designing watermarking codes that can withstand geometric and other desynchronization attacks is a notoriously difficult problem. One may ask whether these difficulties are due to...
Pierre Moulin
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
14 years 3 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui