Sciweavers

264 search results - page 35 / 53
» Software Protection by Hardware and Obfuscation
Sort
View
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
14 years 1 months ago
Monitoring of Power System Topology in Real-Time
Power system topology is defined by the connectivity among power system components such as generators, power transformers, transmission lines, loads, etc. The knowledge about topo...
Mladen Kezunovic
DRM
2005
Springer
14 years 1 months ago
Statistical audio watermarking algorithm based on perceptual analysis
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the pe...
Xiaomei Quan, Hongbin Zhang
ASIACRYPT
2001
Springer
13 years 11 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
CHI
2002
ACM
14 years 8 months ago
The context fabric: an infrastructure for context-aware computing
Despite many sensor, hardware, networking, and software advances, it is still quite difficult to build effective and reliable context-aware applications. We propose to build a con...
Jason I. Hong
CCS
2007
ACM
14 years 2 months ago
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Boris Köpf, David A. Basin