Sciweavers

305 search results - page 43 / 61
» From Sets to Bits in Coq
Sort
View
123
Voted
IEEEIAS
2007
IEEE
15 years 6 months ago
An LSB Data Hiding Technique Using Prime Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically m...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
CCS
2007
ACM
15 years 6 months ago
Do background images improve "draw a secret" graphical passwords?
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical analysis suggests that DAS supports an overall password space larger than that of the ubiqu...
Paul Dunphy, Jeff Yan
91
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
A General Model and Analysis of Physical Layer Capture in 802.11 Networks
Abstract— While packet capture has been observed in real implementations of 802.11 devices, there is a lack of accurate models that describe the phenomenon. We present a general ...
Hoon Chang, Vishal Misra, Dan Rubenstein
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
15 years 6 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
ISCAS
2005
IEEE
126views Hardware» more  ISCAS 2005»
15 years 6 months ago
Scheduling algorithm for partially parallel architecture of LDPC decoder by matrix permutation
— The fully parallel LDPC decoding architecture can achieve high decoding throughput, but it suffers from large hardware complexity caused by a large set of processing units and ...
In-Cheol Park, Se-Hyeon Kang