Sciweavers

221 search results - page 45 / 45
» Data Hiding Techniques Using Prime and Natural Numbers
Sort
View
DAC
2004
ACM
14 years 5 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...