Sciweavers

305 search results - page 43 / 61
» From Sets to Bits in Coq
Sort
View
IEEEIAS
2007
IEEE
15 years 5 months ago
An LSB Data Hiding Technique Using Prime Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically m...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
CCS
2007
ACM
15 years 5 months ago
Do background images improve "draw a secret" graphical passwords?
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical analysis suggests that DAS supports an overall password space larger than that of the ubiqu...
Paul Dunphy, Jeff Yan
INFOCOM
2006
IEEE
15 years 4 months ago
A General Model and Analysis of Physical Layer Capture in 802.11 Networks
Abstract— While packet capture has been observed in real implementations of 802.11 devices, there is a lack of accurate models that describe the phenomenon. We present a general ...
Hoon Chang, Vishal Misra, Dan Rubenstein
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
15 years 4 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
ISCAS
2005
IEEE
126views Hardware» more  ISCAS 2005»
15 years 4 months ago
Scheduling algorithm for partially parallel architecture of LDPC decoder by matrix permutation
— The fully parallel LDPC decoding architecture can achieve high decoding throughput, but it suffers from large hardware complexity caused by a large set of processing units and ...
In-Cheol Park, Se-Hyeon Kang