Conference keys are secret keys used by a group of users commonly and with which they can encipher (or decipher) messages such that communications are secure. Based on the Diffie ...
Service-oriented grids are grid computing systems built with the notion of service-oriented architecture (SOA). Using two maract concepts, services and connections between service...
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
The goal of steganalysis is to search for the presence of hidden information in numerical contents. This paper is based on a previous LSB steganalysis scheme for digital images th...
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...