Sciweavers

909 search results - page 55 / 182
» Reversible data hiding
Sort
View
ICCSA
2003
Springer
14 years 3 months ago
Progressive Curve Representation Based on Reverse Subdivision
Abstract. A progressive curve representation based on reverse subdivision is introduced. This consists of three main components. First, multi-resolution structures for some common ...
Faramarz F. Samavati, Mai Ali Nur, Richard M. Bart...
ESORICS
2009
Springer
14 years 10 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
SAC
2006
ACM
14 years 4 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
CW
2002
IEEE
14 years 3 months ago
Direct Segmentation for Reverse Engineering
In Reverse Engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate co...
Marek Vanco, Guido Brunnett
MOBICOM
1999
ACM
14 years 2 months ago
Reversing the Collision-Avoidance Handshake in Wireless Networks
Many medium-access control (MAC) protocols for wireless networks proposed or implemented to date are based on collisionavoidance handshakes between sender and receiver. In the vas...
J. J. Garcia-Luna-Aceves, Asimakis Tzamaloukas