Sciweavers

2474 search results - page 451 / 495
» Attacks on Steganographic Systems
Sort
View
FGCS
2007
90views more  FGCS 2007»
14 years 11 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
IJNSEC
2007
164views more  IJNSEC 2007»
14 years 11 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
SPEECH
2008
71views more  SPEECH 2008»
14 years 11 months ago
Unsupervised intra-speaker variability compensation based on Gestalt and model adaptation in speaker verification with telephone
In this paper an unsupervised compensation method based on Gestalt, ISVC, is proposed to address the problem of limited enrolling data and noise robustness in text-dependent speak...
Néstor Becerra Yoma, Claudio Garretó...
TIFS
2008
208views more  TIFS 2008»
14 years 11 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
VIROLOGY
2008
121views more  VIROLOGY 2008»
14 years 11 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...