Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of at...
This paper2 presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images ...
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
—Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault ...
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...