The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for scrambling with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1984 (18) 1985-1993 (15) 1994-1996 (19) 1997-1999 (17) 2000-2001 (16) 2002 (17) 2003 (20) 2004 (25) 2005 (18) 2006 (34) 2007 (24) 2008 (54) 2009 (22) 2010 (18) 2011 (22) 2012 (24) 2013 (24) 2014 (31) 2015 (30) 2016 (26) 2017 (51) 2018 (35) 2019 (30) 2020 (27) 2021 (38) 2022 (40) 2023 (40) 2024 (9)
Publication types (Num. hits)
article(359) incollection(1) inproceedings(382) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 166 occurrences of 143 keywords

Results
Found 744 publication records. Showing 744 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Lihong Ma 0002, Guifeng Cheng, Zhijian Wu, Xiaoxi Luo, Hanqing Lu Phase-only transform based shaping for error concealment coding. Search on Bibsonomy MobiMedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multiple description vector quantization, phase-only transform, reshaping
13Ho-Jae Lee, Jeho Nam Low complexity controllable scrambler/descrambler for H.264/AVC in compressed domain. Search on Bibsonomy ACM Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, encryption, H.264, AVC, scramble, CABAC
13Wen Ye, Lei Cheng, Hongxu Cui, Ju Bu Heuristic Frequency Optimizing in GSM/GPRS Networks. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Hakan Hacigümüs SPIDER: An Autonomic Computing Approach to Database Security Management. Search on Bibsonomy Secure Data Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Hongjie He, Jiashu Zhang, Heng-Ming Tai A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF the vector quantization attack, the transplantation attack, discrete wavelet transform (DWT), fragile watermarking
13Rade Petrovic, Babak Tehranchi, Joseph M. Winograd Digital watermarking security considerations. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SDMI, copy control, watermark attacks, digital watermarking, digital rights management
13Jiancheng Zou, Dongxu Qi, Rabab K. Ward A novel watermarking method based on Fibonacci numbers. Search on Bibsonomy VRCIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF watermarking, fibonacci numbers
13Pramod Kumar Meher, Jagdish Chandra Patra, M. R. Meher Low-complexity technique for secure storage and sharing of biomedical images. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Michael Luby, Michael Mitzenmacher Verification-based decoding for packet-based low-density parity-check codes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Adam R. Margetts, Philip Schniter Adaptive chip-rate equalization of downlink multirate wideband CDMA. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13A. G. Barnett, R. C. Wolff A time-domain test for some types of nonlinearity. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13David P. Lytle, Veronica Resendez, Robert August Security in the residential network. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF residence hall, security, network, policy, vulnerability, virus, enforcement, resNet
13Patti Mitch Pooling efforts to cast for better student employees. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF evaluation, applicant, interview
13JuSung Park, Jeonil Kang, DaeHun Nyang Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Patrick Perrot, Guido Aversano, Gérard Chollet Voice Disguise and Automatic Detection: Review and Perspectives. Search on Bibsonomy WNSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF disguise, classification, detection, automatic
13Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan, Guanjun Bao Principle of Image Encrypting Algorithm Based on Magic Cube Transformation. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Renée McCauley Outgoing links. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Yan Xin 0002, Ivan J. Fair High-order spectral- multimode codes. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Philippe Jost, Pierre Vandergheynst, Pascal Frossard Redundant image representations in security applications. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Daniel Schonberg, Darko Kirovski Fingerprinting and forensic analysis of multimedia. Search on Bibsonomy ACM Multimedia The full citation details ... 2004 DBLP  DOI  BibTeX  RDF video, audio, fingerprinting, collusion attack, forensic analysis
13Carolina Selva, Cosimo Torelli, Danilo Rimondi, Rita Zappa, Stefano Corbani, Giovanni Mastrodomenico, Lara Albani A Programmable Built-in Self-Diagnosis for Embedded SRAM. Search on Bibsonomy MTDT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Luiza de Macedo Mourelle, Nadia Nedjah Efficient Cryptographic Hardware Using the Co-Design Methodology. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Nadia Nedjah, Luiza de Macedo Mourelle Evolutionary RSA-Based Cryptographic Hardware Using the Co-Design Methodology. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Richard L. Rollason-Reese Incident handling: an orderly response to unexpected events. Search on Bibsonomy SIGUCCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF incident handling, response team, attack, recovery, emergency, incident response
13Luca Benini, Alberto Macii, Enrico Macii, Elvira Omerbegovic, Fabrizio Pro, Massimo Poncino Energy-aware design techniques for differential power analysis protection. Search on Bibsonomy DAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF low-power design, differential power analysis
13Thomas P. Krauss, William J. Hillery, Michael D. Zoltowski Downlink Specific Linear Equalization for Frequency Selective CDMA Cellular Systems. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF space-time processing, wireless communications, equalization, spread spectrum, smart antennas, RAKE receiver
13Thamer Al-Meshhadany, Khaldoun Al Agha VCB by means of soft2hard handover in WCDMA. Search on Bibsonomy MWCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13John E. Kleider, Glen P. Abousleman Image quality optimization using computationally efficient variable QoS multicarrier bit-allocation. Search on Bibsonomy ISCAS (5) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Koji Asami, Yasuo Furukawa, Michael Purtell, Motoo Ueda, Karl Watanabe, Toshifumi Watanabe WCDMA Testing with a Baseband/IF Range AWG. Search on Bibsonomy ITC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Frank Huebner, Kathleen S. Meier-Hellstern, Paul Reeser Performance Testing for IP Services and Systems. Search on Bibsonomy Performance Engineering The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Ron Bourret, Christof Bornhövd, Alejandro P. Buchmann A Generic Load/Extract Utility for Data Transfer between XML Documents and Relational Databases. Search on Bibsonomy WECWIS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Management/Exchange of Business Data, XML-Relational Mapping
13Zachary G. Ives, Daniela Florescu, Marc T. Friedman, Alon Y. Levy, Daniel S. Weld An Adaptive Query Execution System for Data Integration. Search on Bibsonomy SIGMOD Conference The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Markus Jakobsson, Julien P. Stern, Moti Yung Scramble All, Encrypt Small. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Qing Chen, Thomas R. Fischer Image coding using robust quantization for noisy digital transmission. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
13Adam Meyers, Michiko Kosaka, Ralph Grishman A Multilingual Procedure for Dictionary-Based Sentence Alignment. Search on Bibsonomy AMTA The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
13Manoj Franklin, Kewal K. Saluja Testing reconfigured RAM's and scrambled address RAM's for pattern sensitive faults. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
13Ernst M. Gabidulin A Fast Matrix Decoding Algorithm for Rank-Error-Correcting Codes. Search on Bibsonomy Algebraic Coding The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
13Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, Hugo De Man Security Considerations in the Design and Implementation of a new DES chip. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
13Sibylle Mund, Dieter Gollmann, Thomas Beth Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
13Mulan Liu, Zhe-xian Wan Generalized Multiplexed Sequences. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
13A. Ecker Time-division Multiplexing Scramblers: Selecting Permutations and Testing the Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
13Burton S. Kaliski Jr. Wyner's Analog Encryption Scheme: Results of a Simulation. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
13Mary Woodward, Peter F. DiGiammarino A case for adaptable applications software. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
13Neil J. A. Sloane Encrypting by Random Rotations. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #744 of 744 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license