Sciweavers

WISA
2005
Springer
13 years 10 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...
WISA
2005
Springer
13 years 10 months ago
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
Abstract. A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signatur...
Je Hong Park, Bo Gyeong Kang, Sangwoo Park
WISA
2005
Springer
13 years 10 months ago
Key Factors Influencing Worm Infection in Enterprise Networks
Urupoj Kanlayasiri, Surasak Sanguanpong
WISA
2005
Springer
13 years 10 months ago
Video Fingerprinting System Using Wavelet and Error Correcting Code
In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the ...
Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, H...
WISA
2005
Springer
13 years 10 months ago
DPA Attack on the Improved Ha-Moon Algorithm
Abstract. The algorithm proposed by Ha and Moon [2] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a r...
Jong Hoon Shin, Dong Jin Park, Pil Joong Lee
WISA
2005
Springer
13 years 10 months ago
Oblivious Conjunctive Keyword Search
Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jong...