Sciweavers

236 search results - page 25 / 48
» From Weak to Strong Watermarking
Sort
View
TMC
2012
12 years 8 days ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
ICNP
2000
IEEE
14 years 2 months ago
Hop Integrity in Computer Networks
A computer network is said to provide hop integrity iff when any router p in the network receives a message m supposedly from an adjacent router q, then p can check that m was ind...
Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang,...
ELPUB
2008
ACM
13 years 11 months ago
A review of journal policies for sharing research data
Background: Sharing data is a tenet of science, yet commonplace in only a few subdisciplines. Recognizing that a data sharing culture is unlikely to be achieved without policy gui...
Heather A. Piwowar, Wendy Webber Chapman
FOSSACS
2009
Springer
14 years 4 months ago
Reactive Systems, Barbed Semantics, and the Mobile Ambients
Reactive systems, proposed by Leifer and Milner, represent a meta-framework aimed at deriving behavioral congruences for those specification formalisms whose operational semantics...
Filippo Bonchi, Fabio Gadducci, Giacoma Valentina ...
FOCS
2003
IEEE
14 years 3 months ago
List-Decoding Using The XOR Lemma
We show that Yao’s XOR Lemma, and its essentially equivalent rephrasing as a Direct Product Lemma, can be re-interpreted as a way of obtaining error-correcting codes with good l...
Luca Trevisan