Sciweavers

4029 search results - page 25 / 806
» Experience with Software Watermarking
Sort
View
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
14 years 3 months ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu
BMCBI
2007
117views more  BMCBI 2007»
13 years 10 months ago
DNA-based watermarks using the DNA-Crypt algorithm
Background: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) ...
Dominik Heider, Angelika Barnekow
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 4 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
ISM
2006
IEEE
114views Multimedia» more  ISM 2006»
14 years 3 months ago
Mobile DRM-Enabled Multimedia Platform for Peer-to-Peer Applications
A mobile Digital Rights Management platform is proposed that follows the DRM reference architecture while including several important functions lacking in the OMA DRM. The platfor...
Mikko Löytynoja, Timo Koskela, Marko Brockman...
CSEE
2007
Springer
14 years 4 months ago
Educational Approach to an Experiment in a Software Architecture Course
This paper reports experiences from an experiment in a software architecture course where the focus was both on giving students valuable education as well as getting important emp...
Alf Inge Wang, Erik Arisholm, Maria Letizia Jacche...