Sciweavers

180 search results - page 25 / 36
» An Information-Theoretic Model for Steganography
Sort
View
TCOM
2008
82views more  TCOM 2008»
14 years 11 months ago
Detecting the number of signals in wireless DS-CDMA networks
In this paper, a new information theoretic algorithm is proposed for signal enumeration in DS-CDMA networks. The approach is based on the predictive description length (PDL) of the...
Shahrokh Valaee, Shahram Shahbazpanahi
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 3 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak
NC
1998
140views Neural Networks» more  NC 1998»
15 years 1 months ago
Recurrent Neural Networks with Iterated Function Systems Dynamics
We suggest a recurrent neural network (RNN) model with a recurrent part corresponding to iterative function systems (IFS) introduced by Barnsley 1] as a fractal image compression ...
Peter Tiño, Georg Dorffner
MSWIM
2003
ACM
15 years 5 months ago
Markov-based modeling of wireless local area networks
Errors introduced by a wireless medium are more frequent and profound than contemporary wired media. Some of these errors, which are not corrected by the physical layer, result in...
Syed A. Khayam, Hayder Radha