Sciweavers

1054 search results - page 107 / 211
» Secret Communication with Feedback
Sort
View
SSWMC
2004
14 years 11 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
CCR
2006
76views more  CCR 2006»
14 years 10 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
ICASSP
2011
IEEE
14 years 1 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
HYBRID
2011
Springer
13 years 9 months ago
Almost sure stability of networked control systems under exponentially bounded bursts of dropouts
A wireless networked control systems (NCS) is a control system whose feedback path is realized over a wireless communication network. The stability of such systems can be problema...
Michael D. Lemmon, Xiaobo Sharon Hu
CHI
2009
ACM
15 years 4 months ago
'Broken Expectations' from a global business perspective
Especially in the past few years, there has been an increase in the rejection rate of interactive consumer electronics products in the field, not due to broken hardware or softwar...
Aylin Koca, Evangelos Karapanos, Aarnout Brombache...