Sciweavers

Share
50 search results - page 1 / 10
» A Novel Approach to Hide Credentials
Sort
View
IJNSEC
2007
79views more  IJNSEC 2007»
9 years 11 months ago
A Novel Approach to Hide Credentials
Zhensong Liao, Hai Jin, Deqing Zou, Weizhong Qiang
TII
2008
132views more  TII 2008»
9 years 11 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
CIKM
2006
Springer
10 years 3 months ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
CODES
2005
IEEE
10 years 5 months ago
Novel architecture for loop acceleration: a case study
In this paper, we show a novel approach to accelerate loops by tightly coupling a coprocessor to an ASIP. Latency hiding is used to exploit the parallelism available in this archi...
Seng Lin Shee, Sri Parameswaran, Newton Cheung
CORR
2010
Springer
181views Education» more  CORR 2010»
9 years 12 months ago
Data Hiding Techniques Using Prime and Natural Numbers
In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding te...
Sandipan Dey, Ajith Abraham, Bijoy Bandyopadhyay, ...
books