×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [secret bits]
Public key steganography using lsb method with chaotic neural network
256 views
Secret key extraction from wireless signal strength in real environments
860 views
Secret key extraction from wireless signal strength in real environments
437 views
Secret key extraction from wireless signal strength in real environments
232 views
WP 3 WP 3 – Quantum Repeaters Časlav Brukner Institute of Quantum Optics and Quantum Information (IQOQI) Vienna & University of Vienna
217 views
Government, Cryptography and the Right To Privacy Jenny Shearer and Peter Gutmann Presented by Paul Conti 4/3/00
214 views
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
224 views
Steganography using overlapping codebook partition
45 views
Reversible hiding in DCT-based compressed images
62 views
Leakage-Resilient Cryptography
39 views
Leakage-Resilient Cryptography
47 views