In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue ...
The aim of this demonstration is to present the ongoing performance of our R. and D. watermarking scheme software. The proposed illustrations cover a large panel of original image...
In this paper we consider the exploitation of spatial timefrequency distribution (STFD) in multiple-input multipleoutput (MIMO) radar systems. STFD has been found useful in solvin...
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now, e-voting protocols have tried to make communicatio...
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...