Sciweavers

346 search results - page 9 / 70
» The Secret Santa Problem
Sort
View
SSWMC
2004
13 years 11 months ago
On estimation of secret message length in LSB steganography in spatial domain
In this paper, we present a new method for estimating the secret message length of bit-streams embedded using the Least Significant Bit embedding (LSB) at random pixel positions. ...
Jessica J. Fridrich, Miroslav Goljan
IJSN
2010
148views more  IJSN 2010»
13 years 8 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
CISS
2011
IEEE
13 years 1 months ago
Secret key generation through OFDM multipath channel
—We analyze the fundamental limits of key generation and describe an implementation based on error correcting codes. We show that key extraction based on channel coefficients si...
Yanpei Liu, Stark C. Draper, Akbar M. Sayeed
IWANN
2005
Springer
14 years 3 months ago
Input Selection for Long-Term Prediction of Time Series
Prediction of time series is an important problem in many areas of science and engineering. Extending the horizon of predictions further to the future is the challenging and diffic...
Jarkko Tikka, Jaakko Hollmén, Amaury Lendas...
TCC
2007
Springer
89views Cryptology» more  TCC 2007»
14 years 3 months ago
On Secret Sharing Schemes, Matroids and Polymatroids
Abstract. One of the main open problems in secret sharing is the characterization of the access structures of ideal secret sharing schemes. As a consequence of the results by Brick...
Jaume Martí-Farré, Carles Padr&oacut...