Sciweavers

3147 search results - page 159 / 630
» Statistically Hiding Sets
Sort
View
ESORICS
2009
Springer
15 years 3 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
ACSD
2006
IEEE
102views Hardware» more  ACSD 2006»
15 years 1 months ago
Models of Computation for Networks on Chip
Networks on chip platforms offer the opportunity to introduce a new abstraction level that defines a set of platform services with performance and power characteristics. By making...
Axel Jantsch
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
15 years 1 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
FIW
2007
157views Communications» more  FIW 2007»
15 years 1 months ago
Managing Feature Interaction by Documenting and Enforcing Dependencies in Software Product Lines
Software product line engineering provides a systematic approach for the reuse of software assets in the production of similar software systems. For such it employs different varia...
Roberto Silveira Silva Filho, David F. Redmiles
ECIS
2003
15 years 1 months ago
Provision of customer knowledge to supply chains
Knowledge about customers is vital for supply chains in order to ensure customer satisfaction. In an ideal supply chain environment, supply chain partners are able to perform plan...
Roland Holten, Alexander Dreiling