Sciweavers

26 search results - page 5 / 6
» On Information Embedding When Watermarks and Covertexts are ...
Sort
View
IH
2005
Springer
13 years 11 months ago
ID Modulation: Embedding Sensor Data in an RFID Timeseries
This paper reports the first use of ID Modulation to embed a bitstream representing sensor information in a standards-compliant Radio Frequency Identification (RFID) channel. Like ...
Joshua R. Smith, Bing Jiang, Sumit Roy, Matthai Ph...
CCS
2005
ACM
13 years 11 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
IH
1998
Springer
13 years 10 months ago
Fingerprinting Digital Circuits on Programmable Hardware
Advanced CAD tools and high-density VLSI technologies have combined to create a new market for reusable digital designs. The economic viability of the new core-based design paradig...
John Lach, William H. Mangione-Smith, Miodrag Potk...
AES
2004
Springer
190views Cryptology» more  AES 2004»
13 years 11 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
ADBIS
2008
Springer
142views Database» more  ADBIS 2008»
14 years 11 days ago
Evaluating Performance and Quality of XML-Based Similarity Joins
A similarity join correlating fragments in XML documents, which are similar in structure and content, can be used as the core algorithm to support data cleaning and data integratio...
Leonardo Ribeiro, Theo Härder