Sciweavers

495 search results - page 33 / 99
» Information theory of wideband communications
Sort
View
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 1 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
MKM
2007
Springer
14 years 1 months ago
A Rational Reconstruction of a System for Experimental Mathematics
Abstract. In previous papers we described the implementation of a system which combines mathematical object generation, transformation and filtering, conjecture generation, provin...
Jacques Carette, William M. Farmer, Volker Sorge
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 8 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
INFOCOM
2006
IEEE
14 years 1 months ago
DFT-MSN: The Delay/Fault-Tolerant Mobile Sensor Network for Pervasive Information Gathering
Abstract— This paper focuses on the Delay/Fault-Tolerant Mobile Sensor Network (DFT-MSN) for pervasive information gathering. We develop simple and efficient data delivery schem...
Yu Wang, Hongyi Wu
IJNSEC
2007
96views more  IJNSEC 2007»
13 years 7 months ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li