The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for tampering with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1999 (18) 2000-2001 (17) 2002-2003 (32) 2004 (20) 2005 (33) 2006 (44) 2007 (56) 2008 (55) 2009 (29) 2010 (18) 2011 (23) 2012 (16) 2013 (22) 2014 (29) 2015 (23) 2016 (31) 2017 (35) 2018 (43) 2019 (53) 2020 (47) 2021 (50) 2022 (47) 2023 (50) 2024 (15)
Publication types (Num. hits)
article(319) incollection(2) inproceedings(481) phdthesis(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 323 occurrences of 220 keywords

Results
Found 806 publication records. Showing 806 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Alexander Becher, Zinaida Benenson, Maximillian Dornseif Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Alexander Becher, Zinaida Benenson, Maximillian Dornseif Tampering with Motes: Real-World Attacks on Wireless Sensor Networks. Search on Bibsonomy Sicherheit The full citation details ... 2006 DBLP  BibTeX  RDF
17Gilbert L. Peterson Forensic Analysis of Digital Image Tampering. Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2005 DBLP  BibTeX  RDF
17Ronald F. DeMara, Adam J. Rocke Mitigation of network tampering using dynamic dispatch of mobile agents. Search on Bibsonomy Comput. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Frédéric Deguillaume, Sviatoslav Voloshynovskiy, Thierry Pun Secure hybrid robust watermarking resistant against tampering and copy attack. Search on Bibsonomy Signal Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Gleb Naumovich, Nasir D. Memon Preventing Piracy, Reverse Engineering, and Tampering. Search on Bibsonomy Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Jun Yang 0002, Youtao Zhang, Lan Gao Fast Secure Processor for Inhibiting Software Piracy and Tampering. Search on Bibsonomy MICRO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Mario Blaum, Jehoshua Bruck, Kurt Rubin, Wilfried Lenth A Coding Approach for Detection of Tampering in Write-Once Optical Disks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Ingemar J. Cox, Jean-Paul M. G. Linnartz Some general methods for tampering with watermarks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Massimo Cotrozzi, David Vincenzetti ATP - Anti-Tampering Program. Search on Bibsonomy USENIX Security Symposium The full citation details ... 1993 DBLP  BibTeX  RDF
17Yvo Desmedt, Jean-Jacques Quisquater Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?). Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
17Subhash C. Kak How to Detect Tampering of Data. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
11N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar Can we certify systems for freedom from malware. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
11Ruirui C. Huang, G. Edward Suh IVEC: off-chip memory integrity protection for both security and reliability. Search on Bibsonomy ISCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, fault tolerance, reliability, error detection, error correction, memory systems
11Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang 0001, Meng-Cheng Tsai A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Weiping Wang 0003, Jinhong Xu, Jianxin Wang 0001 Detection and location of malicious nodes based on source coding and multi-path transmission in WSN. Search on Bibsonomy HPCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Mengqi Zeng, Dawu Gu, Fangyong Hou, Yuanyuan Zhang 0002, Tao Cheng Design and Implementation of Self-securing Disk. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Shucai Xiao, Jung-Min Park 0001, Yanzhu Ye Tamper Resistance for Software Defined Radio Software. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11David J. Boyd TLS client handshake with a payment card. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Levente Kovács, Ákos Utasi, Zoltán Szlávik, Laszlo Havasi, István Petrás, Tamás Szirányi Digital Video Event Detector Framework for Surveillance Applications. Search on Bibsonomy AVSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Tong Liu, Jiya Jiang, Ying Li Research on File Content Tamper-proofing System for Distribution Environment. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Vasily Desnitsky, Igor V. Kotenko Design of Entrusting Protocols for Software Protection. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security protocol design, Remote entrusting, Protocol analysis and verification, Attacks, Software protection
11Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun Attacks on public WLAN-based positioning systems. Search on Bibsonomy MobiSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF localization attacks, public wlan localization
11Dan Boneh, David Mandell Freeman, Jonathan Katz, Brent Waters Signing a Linear Subspace: Signature Schemes for Network Coding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan Tamper-Tolerant Software: Modeling and Implementation. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Sascha Zmudzinski, Martin Steinebach Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Mainak Banga, Michael S. Hsiao A Novel Sustained Vector Technique for the Detection of Hardware Trojans. Search on Bibsonomy VLSI Design The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Rajat Subhra Chakraborty, Francis G. Wolff, Somnath Paul, Christos A. Papachristou, Swarup Bhunia MERO: A Statistical Approach for Hardware Trojan Detection. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Oly Mistry, Anil Gürsel, Sandip Sen Comparing trust mechanisms for monitoring aggregator nodes in sensor networks. Search on Bibsonomy AAMAS (2) The full citation details ... 2009 DBLP  BibTeX  RDF sensor networks, learning, data integrity, reputation
11Saraju P. Mohanty, Bharat K. Bhargava Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF invisible watermarking, Watermarking, image, copyright protection, content protection
11Luc Bouganim, François Dang Ngoc, Philippe Pucheral Dynamic access-control policies on XML encrypted data. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ubiquitous data management, Access-control, smartcard, data confidentiality
11Katharine Chang, Kang G. Shin Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed authentication, node revocation, program integrity verification, wireless sensor networks
11Alan Shieh, Andrew C. Myers, Emin Gün Sirer A stateless approach to connection-oriented protocols. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stateless interfaces, stateless protocols
11Jing-Ming Guo, Soo-Chang Pei, Hua Lee Paired Subimage Matching Watermarking Method on Ordered Dither Images and Its High-Quality Progressive Coding. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Ashwin Swaminathan, Min Wu 0001, K. J. Ray Liu Digital Image Forensics via Intrinsic Fingerprints. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei, Saeed Sarencheh, Vidyasagar M. Potdar Modeling Input Validation in UML. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Software engineering, Unified Modeling Language, Object Constraint Language, Software security, Input validation
11Sufyan Ababneh, Rashid Ansari, Ashfaq A. Khokhar Scalable multimedia-content integrity verification with robust hashing. Search on Bibsonomy EIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Kees Goossens, Martijn T. Bennebroek, Jae Young Hur, Muhammad Aqeel Wahlah Hardwired Networks on Chip in FPGAs to Unify Functional and Con?guration Interconnects. Search on Bibsonomy NOCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Vassilis E. Fotopoulos, Maria L. Stavrinou, Athanassios N. Skodras Medical image authentication and self-correction through an adaptive reversible watermarking technique. Search on Bibsonomy BIBE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin Single-level integrity and confidentiality protection for distributed shared memory multiprocessors. Search on Bibsonomy HPCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11David P. Varodayan, Yao-Chung Lin, Bernd Girod Audio authentication based on distributed source coding. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Mohaned Juwad, Hamed S. Al-Raweshidy Experimental Performance Comparisons between SAODV & AODV. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SAODV, Security, Routing protocols, AODV, test-bed
11Navya Sidharth, Jigang Liu Intrusion Resistant SOAP Messaging with IAPF. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Li Li 0008, Guosun Zeng, Bo Chen Trusted Transmission Protocol for Content Security. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Dongyan Liu, Wenbo Liu 0001, Gong Zhang 0002 An Adaptive Watermarking Scheme Based on Nonsubsampled Contourlet Transform for Color Image Authentication. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Maher Ragheb Aburrous, M. Alamgir Hossain, Fadi A. Thabtah, Keshav P. Dahal Intelligent Quality Performance Assessment for E-Banking Security using Fuzzy Logic. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Direct Internal Attack, Security, Fuzzy Logic, Quality Assessment, E-Banking
11Zhen Zhang, Ying Zhou, Jiquan Kang, Yuan Ren Study of Image Splicing Detection. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Image splicing detection, Passive-blind forensics, Image quality metrics (IQMs), Image feature, Digital image forensics
11Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. Search on Bibsonomy CoNEXT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integrity protection, authentication, hash chains
11Clifford Liem, Yuan Xiang Gu, Harold Johnson A compiler-based infrastructure for software-protection. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF compiler-based techniques, software protection, tamper resistance, code transformation
11Sascha Zmudzinski, Martin Steinebach Psycho-acoustic model-based message authentication coding for audio data. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication watermarking, psycho-acoustic modelling, audio fingerprinting, perceptual hash, robust hash
11Nauman Mazhar, Muddassar Farooq A sense of danger: dendritic cells inspired artificial immune system for manet security. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF misbehavior detection, mobile ad hoc networks, self organization, artificial immune systems, dendritic cells
11Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Matthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, Ramarathnam Venkatesan The Superdiversifier: Peephole Individualization for Software Protection. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Patrick P. Tsang, Sean W. Smith Secure Cryptographic Precomputation with Insecure Memory. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere Towards Tamper Resistant Code Encryption: Practice and Experience. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Ge Xiuhui, Tian Hao Research on Application of Immune Digital Watermark Algorithm. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11XiaoBing Kang, ShengMin Wei Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Dong Zhou, Hiroshi Inamura Towards Trustworthy and Secure Kiosk Computing for Mobile Users. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Mainak Banga, Maheshwar Chandrasekar, Lei Fang 0002, Michael S. Hsiao Guided test generation for isolation and detection of embedded trojans in ics. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trojan
11Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov Circuit CAD Tools as a Security Threat. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Mainak Banga, Michael S. Hsiao A Region Based Approach for the Identification of Hardware Trojans. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SEAD, I-SEAD protocol, Ad hoc networks, simulation experiments, secure routing protocol
11Saar Drimer, Steven J. Murdoch, Ross J. Anderson Thinking Inside the Box: System-Level Failures of Tamper Proofing. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chip and PIN, PIN entry devices, certification, incentives, smartcard, banking, tamper resistance, common criteria, EMV
11Wen-Chao Yang, Che-Yen Wen, Chung-Hao Chen Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Integrity, Public-key Cryptography, Digital Image, Credibility, Digital Image Forensic
11Xianfeng Zhao, Ning Li Reversible Watermarking with Subliminal Channel. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Niladri B. Puhan, Anthony T. S. Ho Secure authentication watermarking for localization against the Holliman-Memon attack. Search on Bibsonomy Multim. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fragile authentication, Holliman-Memon attack, Authenticity score, Security, Localization, Digital watermarking
11Yong-Dong Zhang 0001, Sheng Tang, Jin-Tao Li 0001 Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF PCA (Principal Component Analysis), Hotelling’s T-square statistic, digital signature, image authentication
11Pradeep K. Atrey, Wei-Qi Yan 0001, Mohan S. Kankanhalli A scalable signature scheme for video authentication. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Video authentication, Authentication signature, Secret sharing, Digital video
11Jin-Ha Kim, Gyu Sang Choi, Chita R. Das An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF application server layer, cluster, Web servers, load distribution, user-level communication, Secure Sockets Layer
11Nishkam Ravi, Chandra Narayanaswami, Mandayam T. Raghunath, Marcel-Catalin Rosu Securing Pocket Hard Drives. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF portable storage device, security, mobile computing
11Miao Yu, Hongjie He, Jiashu Zhang A digital authentication watermarking scheme for JPEG images with superior localization and security. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF localization accuracy, collage attack, fragile watermarking, JPEG compression
11Micah K. Johnson, Hany Farid Exposing Digital Forgeries in Complex Lighting Environments. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Weiqi Luo 0001, Zhenhua Qu, Feng Pan, Jiwu Huang A survey of passive technology for digital image forensics. Search on Bibsonomy Frontiers Comput. Sci. China The full citation details ... 2007 DBLP  DOI  BibTeX  RDF passive/blind forensics, pattern recognition, watermarking, statistics analysis, image authentication
11Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti A Dynamic and Differential CMOS Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF differential logic, dual rail logic, chip-cards, cryptography, differential power analysis, DPA, power analysis
11Yagiz Sutcu, Baris Coskun, Husrev T. Sencar, Nasir D. Memon Tamper Detection Based on Regularity of Wavelet Transform Coefficients. Search on Bibsonomy ICIP (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Erik-Oliver Blaß, Benjamin Fabian, Matthias Fischmann, Seda F. Gürses Security. Search on Bibsonomy Algorithms for Sensor and Ad Hoc Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Yan Zhu 0010, Chang-Tsun Li, Hong-Jia Zhao Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Babak Mahdian, Stanislav Saic On Periodic Properties of Interpolation and Their Application To Image Authentication. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas Secure and Self-stabilizing Clock Synchronization in Sensor Networks. Search on Bibsonomy SSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure and Resilient Computer Systems, Sensor-Network Systems, Self-Stabilization, Clock-synchronization
11Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Zan Li, Kai Fan 0001 A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11John E. Hopcroft, Daniel Sheldon Manipulation-Resistant Reputations Using Hitting Time. Search on Bibsonomy WAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Melek Önen, Refik Molva Secure Data Aggregation with Multiple Encryption. Search on Bibsonomy EWSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Yuxuan Meng, Bo Meng A Digital Signature Scheme in Web-based Negotiation Support System. Search on Bibsonomy I3E (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Kun Wang, Meng Wu, Pengrui Xia, Subin Shen An Incentive-Based Secure Charging Scheme for Integrating Networks. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MANET (Ad Hoc), security, cellular network, incentive, charging, Integrating networks
11Mitsuyuki Takatsuka, Masataka Tada, Ryôichi Sasaki Proposal of the e-Discovery System for Sanitizing Disclosure Information and for Securing Evidence. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking
11Tran Van Lanh, Kai-Sen Chong, Sabu Emmanuel, Mohan S. Kankanhalli A Survey on Digital Camera Image Forensic Methods. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Jing-Ming Guo, Jen-Ho Chen Watermarking in Halftone Images with Kernels-Alternated Error Diffusion and Haar Wavelet Transform. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Byoung-Koo Kim, Seungyong Yoon, Jintae Oh ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF header lookup, intrusion detection, pattern matching
11Shuihua Han, Chao-Hsien Chu, Shuangyuan Yang Content-based Image Authentication: Current Status, Issues, and Challenges. Search on Bibsonomy ICSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF content-based authentication, security, performance trade-off, Image hash
11Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic A low overhead hardware technique for software integrity and confidentiality. Search on Bibsonomy ICCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Benjamin P. Turnbull, Jill Slay Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Fawad Ahmed, Mohammed Yakoob Siyal A Secure and Robust Wavelet-Based Hashing Scheme for Image Authentication. Search on Bibsonomy MMM (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, discrete wavelet transform, image authentication, Image hashing
11Guorui Li, Jingsha He, Yingfang Fu A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Xin Cindy Guo, Dimitrios Hatzinakos Content Based Image Hashing Via Wavelet and Radon Transform. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wavelet Transform, Radon Transform, Image Hashing
11Chia-Chi Wu, Chin-Chen Chang 0001, Shang-Ru Yang An Efficient Fragile Watermarking for Web Pages Tamper-Proof. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Steven Trimberger Trusted Design in FPGAs. Search on Bibsonomy DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Damien Delannay, Benoît Macq Watermarking relying on cover signal content to hide synchronization marks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Hua Yuan, Xiao-Ping (Steven) Zhang Multiscale Fragile Watermarking Based on the Gaussian Mixture Model. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 806 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license