Sciweavers

583 search results - page 70 / 117
» On the Complexity of Matsui's Attack
Sort
View
MEDIAFORENSICS
2010
13 years 10 months ago
Audio annotation watermarking with robustness against DA/AD conversion
In the paper we present a watermarking scheme developed to meet the specific requirements of audio annotation watermarking robust against DA/AD conversion (watermark detection aft...
Kun Qian, Christian Krätzer, Michael Biermann...
IPL
2007
72views more  IPL 2007»
13 years 8 months ago
How to safely close a discussion
In the secure communication problem, we focus on safe termination. In applications such as electronic transactions, we want each party to be ensured that both sides agree on the s...
Gildas Avoine, Serge Vaudenay
COMPGEOM
2011
ACM
13 years 1 days ago
Minors in random and expanding hypergraphs
We introduce a new notion of minors for simplicial complexes (hypergraphs), so-called homological minors. Our motivation is to propose a general approach to attack certain extrema...
Uli Wagner
ICSE
2008
IEEE-ACM
14 years 8 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 3 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock