Sciweavers

977 search results - page 62 / 196
» Secret image sharing
Sort
View
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 7 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
CCR
2006
76views more  CCR 2006»
15 years 4 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
PUC
2010
116views more  PUC 2010»
15 years 2 months ago
Requirements for mobile photoware
What is the future of digital imaging? Mobile imaging technologies have been changing rapidly and will continue to do so. We explore new developments in cameraphone photography wit...
Morgan Ames, Dean Eckles, Mor Naaman, Mirjana Spas...
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 8 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
PERCOM
2006
ACM
16 years 3 months ago
Seamless Browsing of Visual Contents in Shared Learning Environments
This paper presents a new interaction technique for browsing large visual information bases in a collaborative environment. The ATELIER project deals with learning environments fo...
Marco Loregian, Kresimir Matkovic, Thomas Psik