Sciweavers

162 search results - page 19 / 33
» Deconvolving Protected Signals
Sort
View
CONEXT
2008
ACM
13 years 9 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
IEEEMM
2007
96views more  IEEEMM 2007»
13 years 7 months ago
Perceptual Issues in Haptic Digital Watermarking
— The growing interest in haptic applications such as skill training, museum displays, multimodal interfaces, aids for people with visual and/or hearing impairments, etc suggests...
Domenico Prattichizzo, Mauro Barni, Gloria Menegaz...
MOBISYS
2007
ACM
14 years 7 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
14 years 4 months ago
Remote activation of ICs for piracy prevention and digital right management
— We introduce a remote activation scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy. Remote activation enables designers to lock eac...
Yousra Alkabani, Farinaz Koushanfar, Miodrag Potko...
ACISP
2005
Springer
14 years 29 days ago
Traversing Middleboxes with the Host Identity Protocol
The limited flexibility of the Internet to support mobility has motivated many researchers to look for alternative architectures. One such effort that combines security and multi...
Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, A...