Sciweavers

360 search results - page 31 / 72
» On Protection by Layout Randomization
Sort
View
ICWN
2004
14 years 11 months ago
Does Cluster Architecture Enhance Performance Scalability of Clustered Mobile Ad Hoc Networks?
This paper explains and evaluates the performance of a cluster architecture-based routing protocol, called Link Cluster Protocol (LCP), in mobile ad hoc networks (MANETs). LCP show...
Myeong L. Lim, Chansu Yu
CSREASAM
2006
14 years 11 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
DCC
2008
IEEE
15 years 9 months ago
Optimal Audio Transmission over Wireless Tandem Channels
In this paper, we propose a statistical optimization framework for transmitting audio sequences over wireless links. Our proposed framework protects audio frames against both temp...
Ala F. Khalifeh, Homayoun Yousefi'zadeh
CCS
2005
ACM
15 years 3 months ago
Untraceable RFID tags via insubvertible encryption
We introduce a new cryptographic primitive, called insubvertible encryption, that produces ciphertexts which can be randomized without the need of any key material. Unlike plain u...
Giuseppe Ateniese, Jan Camenisch, Breno de Medeiro...
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 1 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...