Search

Your search keyword '"DATA encryption"' showing total 2,148 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic computers and society Remove constraint Topic: computers and society Publisher springer nature Remove constraint Publisher: springer nature
2,148 results on '"DATA encryption"'

Search Results

1. Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.

2. Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding.

3. Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification.

4. A Fusion of Maximum Likelihood and Structural Steganalysis.

5. Security of Invertible Media Authentication Schemes Revisited.

6. Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries.

7. Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.

8. A Graph Game Model for Software Tamper Protection.

9. Tamper Hiding: Defeating Image Forensics.

10. Exposing Digital Forgeries Through Specular Highlights on the Eye.

11. Combining Tardos Fingerprinting Codes and Fingercasting.

12. Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.

13. A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization.

14. Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio.

15. Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction.

16. Reducing the Complexity of Syndrome Coding for Embedding.

17. How Can Reed-Solomon Codes Improve Steganographic Schemes?

18. Steganographic Communication with Quantum Information.

19. Practical Security Analysis of Dirty Paper Trellis Watermarking.

20. Exploiting Security Holes in Lattice Data Hiding.

21. Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.

22. Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation.

23. Space-Efficient Kleptography Without Random Oracles.

24. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis.

25. MPSteg-color: A New Steganographic Technique for Color Images.

26. Drive-By Pharming.

27. Application of the PageRank Algorithm to Alarm Graphs.

28. Firewall for Dynamic IP Address in Mobile IPv6.

29. DDoS Attack Detection Algorithms Based on Entropy Computing.

30. Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.

31. BIOS Security Analysis and a Kind of Trusted BIOS.

32. Detection and Diagnosis of Control Interception.

33. A Novel Approach for Untrusted Code Execution.

34. Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.

35. Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.

36. Extending FORK-256 Attack to the Full Hash Function.

37. Differential Fault Analysis on CLEFIA.

38. Modeling Agreement Problems in the Universal Composability Framework.

39. Secure Multiparty Computation of DNF.

40. Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.

41. A System Architecture for History-Based Access Control for XML Documents.

42. Square Like Attack on Camellia.

43. What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security.

44. A Framework for Game-Based Security Proofs.

45. Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard.

46. Boudot's Range-Bounded Commitment Scheme Revisited.

47. Compact and Secure Design of Masked AES S-Box.

48. MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set.

49. High Speed Modular Divider Based on GCD Algorithm.

50. On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme.

Catalog

Books, media, physical & digital resources