Sciweavers

12637 search results - page 124 / 2528
» Security for Extensible Systems
Sort
View
ICIP
2005
IEEE
14 years 10 months ago
An adaptive DCT-based Mod-4 steganographic method
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
Xiaojun Qi, KokSheik Wong
IAJIT
2006
92views more  IAJIT 2006»
13 years 9 months ago
A Rule-Based Extensible Stemmer for Information Retrieval with Application to Arabic
: This paper presents a new and extensible method for information retrieval and content analysis in natural languages (NL). The proposed method is stem-based; stems are extracted b...
Haidar Harmanani, Walid Keirouz, Saeed Raheel
USENIX
2001
13 years 10 months ago
The X Resize and Rotate Extension - RandR
The X Window System protocol, Version 11, was deliberately designed to be extensible, to provide for both anticipated and unanticipated needs. The X11 core did not anticipate that...
Jim Gettys, Keith Packard
ESORICS
2006
Springer
14 years 23 days ago
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Abstract We present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which we consider authentication and key secrecy properties. Our ...
Michael Backes, Iliano Cervesato, Aaron D. Jaggard...
GLOBECOM
2007
IEEE
14 years 3 months ago
Directional MAC for 60 GHz Using Polarization Diversity Extension (DMAC-PDX)
— This paper proposes a directional medium access control (DMAC) algorithm for wireless communication networks operating in the 60 GHz bands. Wireless communications using the 60...
Ferhat Yildirim, Huaping Liu