Sciweavers

237 search results - page 34 / 48
» On information hiding with incomplete information about steg...
Sort
View
IWSEC
2007
Springer
15 years 3 months ago
GAS: Overloading a File Sharing Network as an Anonymizing System
Anonymity is considered as a valuable property as far as everyday transactions in the Internet are concerned. Users care about their privacy and they seek for new ways to keep sec...
Elias Athanasopoulos, Mema Roussopoulos, Kostas G....
WPES
2006
ACM
15 years 3 months ago
Private social network analysis: how to assemble pieces of a graph privately
Connections in distributed systems, such as social networks, online communities or peer-to-peer networks, form complex graphs. These graphs are of interest to scientists in field...
Keith B. Frikken, Philippe Golle
INFOVIS
2005
IEEE
15 years 3 months ago
Revealing Structure within Clustered Parallel Coordinates Displays
In order to gain insight into multivariate data, complex structures must be analysed and understood. Parallel coordinates is an excellent tool for visualizing this type of data bu...
Jimmy Johansson, Patric Ljung, Mikael Jern, Matthe...
IPPS
2003
IEEE
15 years 3 months ago
An Analysis of Performance Enhancement Techniques for Overset Grid Applications
The overset grid methodology has significantly reduced time-to-solution of high-fidelity computational fluid dynamics (CFD) simulations about complex aerospace configurations....
M. Jahed Djomehri, Rupak Biswas, Mark Potsdam, Rog...
CRYPTO
1998
Springer
105views Cryptology» more  CRYPTO 1998»
15 years 2 months ago
An Efficient Discrete Log Pseudo Random Generator
The exponentiation function in a finite field of order p (a prime number) is believed to be a one-way function. It is well known that O(log log p) bits are simultaneously hard for ...
Sarvar Patel, Ganapathy S. Sundaram