Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quanti...
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections hav...
Noble forces in image segmentation based on active contours models are proposed for capturing objects in the image. Contemplating the common functionality of forces in previous ac...