Sciweavers

1957 search results - page 300 / 392
» Embedded Processor Security
Sort
View
ICMCS
2007
IEEE
125views Multimedia» more  ICMCS 2007»
15 years 11 months ago
JPEG Based Conditional Entropy Coding for Correlated Steganography
Correlated steganography considers the case in which the cover Work is chosen to be correlated with the covert message that is to be hidden. The advantage of this is that, at leas...
Lei Zheng, Ingemar J. Cox
SACRYPT
2007
Springer
167views Cryptology» more  SACRYPT 2007»
15 years 11 months ago
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...
IWIA
2006
IEEE
15 years 11 months ago
High Robustness Requirements in a Common Criteria Protection Profile
The development of a Common Criteria protection profile for high-robustness separation kernels requires explicit modifications of several Common Criteria requirements as well as e...
Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvin...
DRM
2005
Springer
15 years 10 months ago
Statistical audio watermarking algorithm based on perceptual analysis
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the pe...
Xiaomei Quan, Hongbin Zhang
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 10 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory