Search

Your search keyword '"Megías, David"' showing total 175 results

Search Constraints

Start Over You searched for: Author "Megías, David" Remove constraint Author: "Megías, David"
175 results on '"Megías, David"'

Search Results

1. Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review

2. Deep Learning for Steganalysis of Diverse Data Types: A review of methods, taxonomy, challenges and future directions

3. ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

7. Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications

9. Toward the Selection of a Lightweight Authentication Technique for the Security of Smart Homes: Framework Architecture Based on a User Centric Design

10. WaterCrypt: Joint Watermarking and Encryption Scheme for Secure Privacy-Preserving Data Aggregation in Smart Metering Systems

11. Differentially Private Graph Publishing Through Noise-Graph Addition

12. Evaluation and Analysis of Reversible Watermarking Techniques in WSN for Secure, Lightweight Design of IoT Applications: A Survey

13. Towards Measuring Fairness for Local Differential Privacy

14. Secure protocol to protect location privacy in distance calculation

15. Detection of Classifier Inconsistencies in Image Steganalysis

19. Are Sequential Patterns Shareable? Ensuring Individuals’ Privacy

20. PSUM:Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting

21. Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting

22. LSB Matching Steganalysis Based on Patterns of Pixel Differences and Random Embedding

23. Unsupervised Steganalysis Based on Artificial Training Sets

24. Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees

30. Fair and Private Data Preprocessing through Microaggregation.

32. VSPReP: Verifiable, Secure and Privacy-Preserving Remote Polling with Untrusted Computing Devices

34. SwapMob: Swapping Trajectories for Mobility Anonymization

36. Enabling Collaborative Privacy in User-Generated Emergency Reports

37. User-Centric Privacy-Preserving Collection and Analysis of Trajectory Data

43. Reversible Data Hiding Based On H.264/AVC Intra Prediction

45. Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity

46. Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio

47. Robust Frequency Domain Audio Watermarking: A Tuning Analysis

Catalog

Books, media, physical & digital resources