Sciweavers

60
Voted
TIFS
2016
75views more  TIFS 2016»
10 years 14 days ago
Detectability of the Order of Operations: An Information Theoretic Approach
Abstract—As it is more and more convenient to manipulate multimedia content, the authenticity of multimedia content becomes questionable. While there are many forensic techniques...
Xiaoyu Chu, Yan Chen, K. J. Ray Liu
TIFS
2016
66views more  TIFS 2016»
10 years 14 days ago
PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement
—Spectrum security and enforcement is one of the major challenges that need to be addressed before spectrum sharing technologies can be adopted widely. The problem of rogue trans...
Vireshwar Kumar, Jung-Min "Jerry" Park, Kaigui Bia...
TIFS
2016
76views more  TIFS 2016»
10 years 14 days ago
Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach
—This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks using stochastic geometry. In ...
Yansha Deng, Lifeng Wang, Maged Elkashlan, Arumuga...
TIFS
2016
72views more  TIFS 2016»
10 years 14 days ago
Information Theory and the IrisCode
—Iris recognition has legendary resistance to False Matches, and the tools of information theory can help to explain why. The concept of entropy is fundamental to understanding b...
John Daugman
TIFS
2016
76views more  TIFS 2016»
10 years 14 days ago
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
—Algebraic fault analysis (AFA), which combines algebraic cryptanalysis with fault attacks, has represented serious threats to the security of lightweight block ciphers. Inspired...
Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian ...