Search

Your search keyword '"DATA encryption"' showing total 2,152 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic computers and society Remove constraint Topic: computers and society
2,152 results on '"DATA encryption"'

Search Results

1. Exploiting Security Holes in Lattice Data Hiding.

2. Reducing the Complexity of Syndrome Coding for Embedding.

3. Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding.

4. Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification.

5. Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries.

6. Tamper Hiding: Defeating Image Forensics.

7. Exposing Digital Forgeries Through Specular Highlights on the Eye.

8. Combining Tardos Fingerprinting Codes and Fingercasting.

9. Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.

10. A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization.

11. Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio.

12. Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction.

13. Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.

14. A Fusion of Maximum Likelihood and Structural Steganalysis.

15. Security of Invertible Media Authentication Schemes Revisited.

16. Practical Security Analysis of Dirty Paper Trellis Watermarking.

17. How Can Reed-Solomon Codes Improve Steganographic Schemes?

18. Space-Efficient Kleptography Without Random Oracles.

19. Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.

20. A Graph Game Model for Software Tamper Protection.

21. Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.

22. Steganographic Communication with Quantum Information.

23. Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation.

24. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis.

25. MPSteg-color: A New Steganographic Technique for Color Images.

26. Drive-By Pharming.

27. Application of the PageRank Algorithm to Alarm Graphs.

28. Firewall for Dynamic IP Address in Mobile IPv6.

29. DDoS Attack Detection Algorithms Based on Entropy Computing.

30. Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.

31. Detection and Diagnosis of Control Interception.

32. BIOS Security Analysis and a Kind of Trusted BIOS.

33. A Novel Approach for Untrusted Code Execution.

34. Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.

35. Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.

36. A System Architecture for History-Based Access Control for XML Documents.

37. Modeling Agreement Problems in the Universal Composability Framework.

38. What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security.

39. A Framework for Game-Based Security Proofs.

40. Extending FORK-256 Attack to the Full Hash Function.

41. Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard.

42. Differential Fault Analysis on CLEFIA.

43. Square Like Attack on Camellia.

44. Secure Multiparty Computation of DNF.

45. Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.

46. Boudot's Range-Bounded Commitment Scheme Revisited.

47. Compact and Secure Design of Masked AES S-Box.

48. MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set.

49. High Speed Modular Divider Based on GCD Algorithm.

50. On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme.

Catalog

Books, media, physical & digital resources