Sciweavers

888 search results - page 88 / 178
» Digital detective - Bluetooth
Sort
View
EUROPKI
2007
Springer
14 years 4 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier
ICDCSW
2006
IEEE
14 years 4 months ago
Fair Dice: A Tilt and Motion-Aware Cube with a Conscience
As an example of digital augmentation of a tiny object, a small cube-sized die is presented that perceives and records what face it rolls on. It is thus able to detect bias and co...
Kristof Van Laerhoven, Hans-Werner Gellersen
AC
1997
Springer
14 years 2 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
ICCD
1992
IEEE
83views Hardware» more  ICCD 1992»
14 years 2 months ago
Logical Verification of the NVAX CPU Chip Design
ct Digital's NVAX high-performance microprocessor has a complex logical design. A rigorous simulation-based verification effort was undertaken to ensure that there were no log...
Walker Anderson
SSWMC
2004
13 years 11 months ago
Steganalysis using color wavelet statistics and one-class support vector machines
Steganographic messages can be embedded into digital images in ways that are imperceptible to the human eye. These messages, however, alter the underlying statistics of an image. ...
Siwei Lyu, Hany Farid