Sciweavers

667 search results - page 39 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
JSAC
2010
92views more  JSAC 2010»
14 years 10 months ago
Analysis of Nonlinear Transition Shift and Write Precompensation in Perpendicular Recording Systems
Abstract—In high density perpendicular magnetic recording channels, nonlinear transition shift (NLTS) is one of the distortions that can degrade the system performance. Write pre...
Zheng Wu, Paul H. Siegel, Jack K. Wolf, H. Neal Be...
ICIP
2005
IEEE
16 years 1 months ago
Redundant-wavelet watermarking with pixel-wise masking
An algorithm is presented which implements image watermarking in the domain of an overcomplete, or redundant, wavelet transform. This algorithm expands on a previous method which ...
Kristen M. Parker, James E. Fowler
AINA
2007
IEEE
15 years 6 months ago
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Ford-Long Wong, Hoon Wei Lim
EMSOFT
2007
Springer
15 years 6 months ago
Methods for multi-dimensional robustness optimization in complex embedded systems
Design space exploration of embedded systems typically focuses on classical design goals such as cost, timing, buffer sizes, and power consumption. Robustness criteria, i.e. sensi...
Arne Hamann, Razvan Racu, Rolf Ernst
CTRSA
2004
Springer
96views Cryptology» more  CTRSA 2004»
15 years 5 months ago
Self-Randomized Exponentiation Algorithms
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
Benoît Chevallier-Mames