Sciweavers

35 search results - page 6 / 7
» Fault Secure Encoder and Decoder for Memory Applications
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 6 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
ESORICS
2007
Springer
14 years 5 days ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
MUE
2008
IEEE
116views Multimedia» more  MUE 2008»
14 years 11 days ago
A Novel Technique for Real-Time Internet Radio Recorder on Non-DSP Embedded System
The capability of providing real-time multimedia player over the Internet is an important future application for embedded system. However, the main challenge of such an applicatio...
Lain-Jing Hwang, Chien-Chou Shih, I-Ting Kuo
CCS
2009
ACM
13 years 9 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
ICS
2004
Tsinghua U.
13 years 11 months ago
Adaptive incremental checkpointing for massively parallel systems
Given the scale of massively parallel systems, occurrence of faults is no longer an exception but a regular event. Periodic checkpointing is becoming increasingly important in the...
Saurabh Agarwal, Rahul Garg, Meeta Sharma Gupta, J...