Sciweavers

117 search results - page 15 / 24
» On the power of quantum fingerprinting
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 2 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
ICIP
2005
IEEE
14 years 10 months ago
Collusion-resistant intentional de-synchronization for digital video fingerprinting
A powerful class of attacks in multimedia fingerprinting is known as collusion attacks, where a clique of colluders, each having a copy of the same multimedia content with differe...
Mehmet Kivanç Mihçak, Yinian Mao
BIOINFORMATICS
2012
11 years 11 months ago
MolClass: a web portal to interrogate diverse small molecule screen datasets with different computational models
Summary: The MolClass toolkit and data portal generates computational models from user-defined small molecule datasets based on structural features identified in hit and non-hit m...
Jan Wildenhain, Nicholas FitzGerald, Mike Tyers
IWDW
2005
Springer
14 years 2 months ago
Performance Study on Multimedia Fingerprinting Employing Traceability Codes
Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Collusion attack is ...
Shan He, Min Wu
ISMIR
2004
Springer
145views Music» more  ISMIR 2004»
14 years 1 months ago
Audio Fingerprinting In Peer-to-peer Networks
Despite the immense potential of Peer-to-Peer (P2P) networks in facilitating collaborative applications, they have become largely known as a free haven for pirated music swapping....
Prarthana Shrestha, Ton Kalker