Sciweavers

5153 search results - page 1002 / 1031
» Introduction to Randomized Algorithms
Sort
View
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 9 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
SASN
2004
ACM
15 years 9 months ago
Source-location privacy in energy-constrained sensor network routing
As sensor-driven applications become increasingly integrated into our lives, issues related to sensor privacy will become increasingly important. Although many privacy-related iss...
Celal Ozturk, Yanyong Zhang, Wade Trappe
153
Voted
EUROCRYPT
2004
Springer
15 years 9 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
144
Voted
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
15 years 9 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
ISAAC
2004
Springer
84views Algorithms» more  ISAAC 2004»
15 years 9 months ago
Property-Preserving Data Reconstruction
We initiate a new line of investigation into online property-preserving data reconstruction. Consider a dataset which is assumed to satisfy various (known) structural properties; e...
Nir Ailon, Bernard Chazelle, Seshadhri Comandur, D...
« Prev « First page 1002 / 1031 Last » Next »