Sciweavers

369 search results - page 69 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
SWS
2006
ACM
15 years 3 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
BMCBI
2010
181views more  BMCBI 2010»
14 years 9 months ago
Intensity dependent estimation of noise in microarrays improves detection of differentially expressed genes
Background: In many microarray experiments, analysis is severely hindered by a major difficulty: the small number of samples for which expression data has been measured. When one ...
Amit Zeisel, Amnon Amir, Wolfgang J. Köstler,...
ICCSA
2010
Springer
15 years 4 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
SOUPS
2006
ACM
15 years 3 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...