Sciweavers

920 search results - page 140 / 184
» Selecting Secure Passwords
Sort
View
SPEECH
2011
13 years 3 months ago
Role of modulation magnitude and phase spectrum towards speech intelligibility
In this paper our aim is to investigate the properties of the modulation domain and more specifically, to evaluate the relative contributions of the modulation magnitude and phas...
Kuldip K. Paliwal, Belinda Schwerin, Kamil K. W&oa...
ITIIS
2010
200views more  ITIIS 2010»
13 years 2 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee
ICIP
2005
IEEE
14 years 9 months ago
An adaptive DCT-based Mod-4 steganographic method
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
Xiaojun Qi, KokSheik Wong
SIGMOD
2005
ACM
103views Database» more  SIGMOD 2005»
14 years 8 months ago
Verifying Completeness of Relational Query Results in Data Publishing
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produ...
HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian...
MOBISYS
2007
ACM
14 years 7 months ago
Context-aware access to public shared devices
To allow for an efficient usage of a device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more comp...
David Jea, Ian Yap, Mani B. Srivastava