Sciweavers

667 search results - page 18 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
USS
2008
15 years 2 days ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
MTA
2011
260views Hardware» more  MTA 2011»
14 years 4 months ago
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Quantization index modulation is one of the best methods for performing blind watermarking, due to its simplicity and good rate-distortion-robustness tradeoffs. In this paper, a ne...
Vivekananda Bhat K., Indranil Sengupta, Abhijit Da...
IWDW
2009
Springer
15 years 4 months ago
Local Patch Blind Spectral Watermarking Method for 3D Graphics
In this paper, we propose a blind watermarking algorithm for 3D meshes. The proposed algorithm embeds spectral domain constraints in segmented patches. After aligning the 3D object...
Ming Luo, Kai Wang, Adrian G. Bors, Guillaume Lavo...
DATE
2008
IEEE
161views Hardware» more  DATE 2008»
15 years 4 months ago
Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis
In the field of the Side Channel Analysis, hardware distortions such as glitches and random frequency are classical countermeasures. A glitch influences the side channel amplitu...
Denis Réal, Cécile Canovas, Jessy Cl...
IWCMC
2006
ACM
15 years 3 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu