Sciweavers

27 search results - page 2 / 6
» Transparent Harddisk Encryption
Sort
View
JDCTA
2010
113views more  JDCTA 2010»
13 years 2 months ago
A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor
Perceptual transparency and robustness are conflicting requirements. To ensure the security of the watermarkhow to choose the embedding position and intensity is a difficult probl...
Xuelong Hu, Wei Tian, Yongai Zheng
ACSAC
1999
IEEE
13 years 12 months ago
Trustworthy Access Control with Untrustworthy Web Servers
If sensitive information is to be included in a shared web, access controls will be required. However, the complex software needed to provide a web service is prone to failure. To...
Tim Wilkinson, Dave Hearn, Simon R. Wiseman
INDOCRYPT
2005
Springer
14 years 1 months ago
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
Prouff has introduced recently, at FSE 2005, the notion of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in ...
Claude Carlet
DAC
2003
ACM
14 years 8 months ago
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
14 years 1 months ago
An Encrypted, Content Searchable Scalable Distributed Data Structure
Scalable Distributed Data Structures (SDDS) store data in a file of key-based records distributed over many storage sites. The number of storage sites utilized grows and shrinks w...
Thomas J. E. Schwarz, Peter Tsui, Witold Litwin