Sciweavers

380 search results - page 76 / 76
» Intrusion-Resilient Secret Sharing
Sort
View
SPIESR
2004
167views Database» more  SPIESR 2004»
14 years 6 days ago
BioMedia: multimedia information systems for biology research, education, and collaboration
The long-term goals of the recently started Biomedia project at SFSU are to provide multimedia information systems and applications for the research and education needs of several...
E. Lank, Dragutin Petkovic, F. A. Ramirez-Weber, J...
COMBINATORICA
2007
126views more  COMBINATORICA 2007»
13 years 10 months ago
Privileged users in zero-error transmission over a noisy channel
The k-th power of a graph G is the graph whose vertex set is V (G)k , where two distinct ktuples are adjacent iff they are equal or adjacent in G in each coordinate. The Shannon ...
Noga Alon, Eyal Lubetzky
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 10 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
JUCS
2008
113views more  JUCS 2008»
13 years 10 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
MOBIHOC
2007
ACM
14 years 10 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao