Sciweavers

1045 search results - page 19 / 209
» On the Security of Digital Tachographs
Sort
View
MMMACNS
2005
Springer
14 years 1 months ago
Unique User-Generated Digital Pseudonyms
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pse...
Peter Schartner, Martin Schaffer
ICMCS
2006
IEEE
187views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Nonnegative Matrix Factorization Scheme for Digital Image Watermarking
We present a new scheme for digital watermarking and secure copyright protection of digital images using nonnegative matrix factorization and singular value decomposition approach...
Mohammadreza Ghaderpanah, A. Ben Hamza
PERCOM
2005
ACM
14 years 7 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
IEEEARES
2009
IEEE
14 years 2 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
IAJIT
2010
112views more  IAJIT 2010»
13 years 6 months ago
Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information
: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Security has always been a major concern since time im...
Moazzam Hossain, Sadia Al Haque, Farhana Sharmin