This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
In this paper, we propose a framework to develop highperformance system accelerator hardware and the corresponding software at system-level. This framework is designed by integrat...
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
: Because of the semantic gap between low-level feature and high-level semantic feature of images, the results of the traditional color-based image retrieval can't meet users&...
We developed a system that detects abnormal sound from sound signal observed by a surveillance microphone. Our system learns the "normal sound" from observation of the m...
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
: This paper proposes a new watermarking method for detecting image tampering. First, an authentication number is created using a pair of watermark pixels as the coefficients of a ...
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
SOSEMANUK is a word-oriented stream cipher submitted to the ECRYPT stream cipher project, with a variable-length key between 128 and 256 bits. The algorithm is similar to the strea...
: An adaptive threshold for early termination is proposed in this paper to enhance the cross octagonal search algorithm (COSA)[1]. In block motion estimation, search patterns have ...