—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
This paper proposes a partial prediction approach for fast mode decision in H.264/AVC 4x4 intra-prediction, exploiting the inherent symmetry existing in the spatial prediction mod...
We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by outof-plane magnetisation ...
Pieter H. Hartel, Leon Abelmann, Mohammed G. Khati...
An important threat to reliable storage of data is silent data corruption. In order to develop suitable protection mechanisms against data corruption, it is essential to understan...
Lakshmi N. Bairavasundaram, Garth R. Goodson, Bian...
In this paper, we introduce a new IP lookup scheme with worst-case search and update time of O(log n), where n is the number of prefixes in the forwarding table. Our scheme is base...
Priyank Ramesh Warkhede, Subhash Suri, George Varg...