— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
Abstract. Mobile ad-hoc networks (MANETs) utilize broadcast channels, where wireless transmissions occur from one user to many others. In a broadcast channel the same transmission ...
The empirical findings from an organization, which adopted and implemented ERP, are presented. The focus of this empirical research was to understand the nature and processes of k...
Jimmy C. Huang, Sue Newell, Shan Ling Pan, Robert ...
This paper describes a watermarking method to directly embed information into a CABAC entropy coded H.264/AVC stream. In theory, modification of a part of an arithmetically coded ...
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani