Sciweavers

54 search results - page 8 / 11
» The role of channel states in secret key generation
Sort
View
ICIP
2009
IEEE
15 years 10 months ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
TIT
2011
160views more  TIT 2011»
14 years 4 months ago
Dispersion of the Gilbert-Elliott Channel
—Channel dispersion plays a fundamental role in assessing the backoff from capacity due to finite blocklength. This paper analyzes the channel dispersion for a simple channel wi...
Yury Polyanskiy, Harold Vincent Poor, Sergio Verd&...
IH
2005
Springer
15 years 3 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
AC
2000
Springer
14 years 9 months ago
State of the art in electronic payment systems
nvented abstract representations of value. As time passed, representations of value became more abstract, progressing from barter through bank notes, payment orders, checks, credit...
N. Asokan, Philippe A. Janson, Michael Steiner, Mi...
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 3 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp