Sciweavers

4413 search results - page 640 / 883
» Security for biometric data
Sort
View
CIS
2005
Springer
15 years 10 months ago
Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset
Abstract. In this paper, we propose a novel solution called joint encryption, in which audio and video data are scrambled efficiently by using modified phase scrambling, modified...
Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do...
ICCSA
2005
Springer
15 years 10 months ago
Fault Attack on the DVB Common Scrambling Algorithm
Abstract. The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a strea...
Kai Wirt
MSS
2003
IEEE
97views Hardware» more  MSS 2003»
15 years 10 months ago
Design of the iSCSI Protocol
The iSCSI protocol enables accessing SCSI I/O devices over an IP network. TCP is used as a transport for SCSI I/O commands. We describe the design considerations and decisions in ...
Kalman Z. Meth, Julian Satran
DGCI
2003
Springer
15 years 10 months ago
Stability in Discrete Tomography: Linear Programming, Additivity and Convexity
The problem of reconstructing finite subsets of the integer lattice from X-rays has been studied in discrete mathematics and applied in several fields like image processing, data...
Sara Brunetti, Alain Daurat
CHES
2001
Springer
98views Cryptology» more  CHES 2001»
15 years 9 months ago
Attacks on Cryptoprocessor Transaction Sets
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two...
Mike Bond