Sciweavers

731 search results - page 18 / 147
» Special Section on Information and Communication System Secu...
Sort
View
DAC
2008
ACM
14 years 9 months ago
Latency and bandwidth efficient communication through system customization for embedded multiprocessors
We present a cross-layer customization methodology for latency and bandwidth efficient inter-core communication in embedded multiprocessors. The methodology integrates compiler, o...
Chenjie Yu, Peter Petrov
ETRICS
2006
14 years 12 days ago
Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious privacy and security issues. The personal information...
Shyong K. Lam, Dan Frankowski, John Riedl
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 8 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen
MOBICOM
2010
ACM
13 years 9 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
INFOCOM
2012
IEEE
11 years 11 months ago
Secure top-k query processing via untrusted location-based service providers
Abstract—This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosiv...
Rui Zhang 0007, Yanchao Zhang, Chi Zhang