Sciweavers

1156 search results - page 2 / 232
» Compositional Methods for Information-Hiding
Sort
View
JEI
2006
113views more  JEI 2006»
13 years 4 months ago
Transparent robust information hiding for ownership verification
For copyright protection, the robustness of a watermarking scheme against various attacks is an essential requirement. Many proposed robust watermarking schemes may achieve good r...
Dan Yu, Farook Sattar, Sirajudeen Gulam Razul
QEST
2010
IEEE
13 years 2 months ago
Information Hiding in Probabilistic Concurrent Systems
Information hiding is a general concept which refers to the goal of preventing an adversary to infer secret information from the observables. Anonymity and Information Flow are exa...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
DAC
2009
ACM
13 years 11 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
IH
2004
Springer
13 years 10 months ago
Information Hiding in Finite State Machine
In this paper, we consider how to hide information into finite state machine (FSM), one of the popular computation models. The key advantage of hiding information in FSM is that t...
Lin Yuan, Gang Qu
SEKE
2005
Springer
13 years 10 months ago
Dynamically Evolvable Composition of Aspects Based On Relation Model
Current aspect-oriented programming (AOP) enhances maintainability and comprehensibility by modularizing concerns crosscutting multiple components but lacks the support for the hie...
Ik-Joo Han, Doo-Hwan Bae