Sciweavers

438 search results - page 13 / 88
» The forest hiding problem
Sort
View
ASPLOS
2004
ACM
15 years 5 months ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande
FC
1999
Springer
97views Cryptology» more  FC 1999»
15 years 4 months ago
Playing "Hide and Seek" with Stored Keys
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. We describe efficie...
Adi Shamir, Nicko van Someren
IH
1998
Springer
15 years 4 months ago
On Software Protection via Function Hiding
Software piracy is a major economic problem: it leads to revenue losses, it favors big software houses that are less hurt by these losses and it prevents new software economy model...
Tomas Sander, Christian F. Tschudin
ICASSP
2008
IEEE
15 years 6 months ago
A new implementation of trellis coded quantization based data hiding
This paper discusses the construction and implementation problem of trellis coded quantization (TCQ) based data hiding. We explore the robustness and distortion of data hiding by ...
Xiaofeng Wang, Xiao-Ping Zhang
COCOA
2007
Springer
15 years 6 months ago
Steiner Forests on Stochastic Metric Graphs
We consider the problem of connecting given vertex pairs over a stochastic metric graph, each vertex of which has a probability of presence independently of all other ver
Vangelis Th. Paschos, Orestis Telelis, Vassilis Zi...