Sciweavers

337 search results - page 54 / 68
» Statistical Disclosure Attacks
Sort
View
ICPR
2004
IEEE
16 years 3 months ago
An Image Watermarking Scheme using HVS Characteristics and Spread Transform
The paper presents a robust digital image watermarking scheme that uses both the characteristics of the human visual system (HVS) and statistical information measure. Spread trans...
Malay Kumar Kundu, Santi P. Maity
109
Voted
EUROCRYPT
2009
Springer
16 years 2 months ago
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
The existence of encryption and commitment schemes secure under selective opening attack (SOA) has remained open despite considerable interest and attention. We provide the rst pub...
Mihir Bellare, Dennis Hofheinz, Scott Yilek
194
Voted
VLDB
2009
ACM
182views Database» more  VLDB 2009»
16 years 2 months ago
Guessing the extreme values in a data set: a Bayesian method and its applications
For a largenumber of data management problems, it would be very useful to be able to obtain a few samples from a data set, and to use the samples to guess the largest (or smallest)...
Mingxi Wu, Chris Jermaine
111
Voted
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
16 years 2 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
101
Voted
ICCAD
2008
IEEE
130views Hardware» more  ICCAD 2008»
15 years 10 months ago
Lightweight secure PUFs
— To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design. Our approach employs int...
Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potk...