Sciweavers

6574 search results - page 67 / 1315
» Current Signatures: Application
Sort
View
IH
1999
Springer
14 years 3 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak
BIRTHDAY
2012
Springer
12 years 6 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
SPIESR
1998
239views Database» more  SPIESR 1998»
14 years 4 days ago
Robust Embedded Data from Wavelet Coefficients
An approach to embedding gray scale images using a discrete wavelet transform is proposed. The proposed scheme enables using signature images that could be as much as 25% of the h...
Jong Jin Chae, B. S. Manjunath
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
12 years 6 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...
ISSTA
2009
ACM
14 years 5 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...