Sciweavers

479 search results - page 84 / 96
» Lightweight Security for Network Coding
Sort
View
ICIP
2000
IEEE
16 years 1 months ago
Compression Tolerant Watermarking for Image Verification
Digital Watermarking is seen as a viable solution to authentication of multimedia data and hence its security, especially in a networked environment. In this paper we present a ne...
Harpal S. Bassali, Jatin Chhugani, Saurabh Agarwal...
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
15 years 8 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
CSSE
2008
IEEE
15 years 6 months ago
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker
Abstract: The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, securit...
Prabhu Shankar Kaliappan, Hartmut Koenig, Vishnu K...
ICIAR
2005
Springer
15 years 5 months ago
Digital Video Scrambling Using Motion Vector and Slice Relocation
As digitalized content rapidly proliferates in networked systems, content security necessarily arises as one of the most important issues. Many developers have studied techniques ...
Sang Gu Kwon, Woong Il Choi, Byeungwoo Jeon
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
15 years 3 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind