Sciweavers

362 search results - page 46 / 73
» Extending the Resynchronization Attack
Sort
View
ISI
2007
Springer
14 years 2 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
WISA
2007
Springer
14 years 2 months ago
Geometrically Invariant Image Watermarking in the DWT Domain
Watermark resistance to both geometric attacks and lossy compressions is a fundamental issue in the image watermarking community. In this paper, we propose a DWT (Discrete Wavelet ...
Shijun Xiang, Hyoung-Joong Kim
CNSR
2006
IEEE
14 years 2 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
ICMCS
2006
IEEE
178views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Spatially Adaptive Wavelet Thresholding for Image Watermarking
In this paper, we introduce a new robust image watermarking technique based on the Discrete Wavelet Transform (DWT). The proposed method extends the concept of image denoising to ...
Mahmood Al-khassaweneh, Selin Aviyente
CONCUR
2005
Springer
14 years 2 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters