Sciweavers

2601 search results - page 319 / 521
» Secure Rewarding Schemes
Sort
View
ISM
2006
IEEE
111views Multimedia» more  ISM 2006»
15 years 10 months ago
Compressed-Domain Encryption of Adapted H.264 Video
Commercial service providers and secret services yearn to employ the available environment for conveyance of their data in a secured way. In order to encrypt or to ensure personal...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...
IPCCC
2005
IEEE
15 years 9 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi
MMSEC
2005
ACM
116views Multimedia» more  MMSEC 2005»
15 years 9 months ago
An SVD-based audio watermarking technique
We present a non-oblivious, extremely robust watermarking scheme for audio signals. The watermarking algorithm is based on the SVD of the spectrogram of the signal. The SVD of the...
Hamza Özer, Bülent Sankur, Nasir D. Memo...
DRMTICS
2005
Springer
15 years 9 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
15 years 9 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud