Sciweavers

1449 search results - page 216 / 290
» Secure and Efficient Metering
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
An audio watermarking method based on molecular matching pursuit
In this paper we introduce a new watermarking model combining a joint time frequency (TF) representation using the molecular matching pursuit (MMP) algorithm and a psychoacoustic ...
Mathieu Parvaix, Sridhar Krishnan, Cornel Ioana
ICC
2008
IEEE
121views Communications» more  ICC 2008»
14 years 4 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen
ISCAS
2008
IEEE
127views Hardware» more  ISCAS 2008»
14 years 4 months ago
Compact ASIC implementation of the ICEBERG block cipher with concurrent error detection
— ICEBERG is a block cipher that has been recently proposed for security applications requiring efficient FPGA implementations. In this paper, we investigate a compact ASIC imple...
Huiju Cheng, Howard M. Heys
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
14 years 4 months ago
Delta Hedging Energy Portfolios: an Exploratory Study
1 Delta hedging, although widely used in commodity markets, needs to be further adapted to electricity markets. Given the extreme volatility of electricity prices, even a portfolio...
Richard Goldberg, James Read, Art Altman, Remi Aud...
MUE
2007
IEEE
104views Multimedia» more  MUE 2007»
14 years 4 months ago
A Conference Key Distribution Scheme Using Interpolating Polynomials
Conference keys are secret keys used by a group of users commonly and with which they can encipher (or decipher) messages such that communications are secure. Based on the Diffie ...
Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen