Sciweavers

252 search results - page 19 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
AFRICACRYPT
2009
Springer
14 years 3 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...
CW
2004
IEEE
14 years 12 days ago
Watermarking a 3D Shape Model Defined as a Point Set
This paper discusses a method to watermark a 3D shape model defined as a set of unoriented points. Our approach is to perform frequency domain analysis of the shape of the 3D poin...
Ryutarou Ohbuchi, Akio Mukaiyama, Shigeo Takahashi
IEEECIT
2010
IEEE
13 years 7 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
RE
2002
Springer
13 years 8 months ago
Exploring the Relationship between Project Selection and Requirements Analysis: An Empirical Study of the New Millennium Program
The relationship between project selection and requirements analysis is important, yet has not received much attention. The decisions made during project selection directly affect...
Mark Bergman, Gloria Mark
MOBIQUITOUS
2007
IEEE
14 years 2 months ago
Securing Cooperative Transmission in Wireless Communications
Abstract— Cooperative transmission is an emerging communication technique that takes advantages of spatial diversity and broadcast natures of wireless channels to improve wireles...
Zhu Han, Yan Lindsay Sun