Sciweavers

634 search results - page 31 / 127
» Groundwork for Weak Analysis
Sort
View
241
Voted
CORR
2011
Springer
536views Education» more  CORR 2011»
14 years 8 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
ICASSP
2011
IEEE
14 years 5 months ago
Analysis of phone confusion in EMG-based speech recognition
In this paper we present a study on phone confusabilities based on phone recognition experiments from facial surface electromyographic (EMG) signals. In our study EMG captures the...
Michael Wand, Tanja Schultz
110
Voted
DCC
2003
IEEE
16 years 1 months ago
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error? correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to e...
Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
15 years 8 months ago
Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption
Content-dependent watermarking (CDWM) has been proposed as a solution to overcome the potential estimation attack aiming to recover and remove the watermark from the host signal. ...
Zhi Li, Xinglei Zhu, Yong Lian, Qibin Sun
ECAI
2004
Springer
15 years 7 months ago
Introducing Alias Information into Model-Based Debugging
Model-based diagnosis applied to computer programs has been studied for several years. Although there are still weaknesses in the used models, especially on dealing with dynamic da...
Daniel Köb, Franz Wotawa