资源列表
OnDesignatedlyVerifiedNon-interactive)Watermarking
- On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this
FromWeaktoStrongWatermarking
- From Weak to Strong Watermarking-The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the conte
CryptanalysisofaNewChaoticCryptosystemBasedonErgod
- Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.
Cryptanalysisofanimageencryptionscheme
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
UsingvisualtagstobypassBluetoothdevicediscovery.ra
- Using visual tags to bypass Bluetooth device discovery.-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth
HandoffsupportformobilitywithIPoverBluetooth
- Handoff support for mobility with IP over Bluetooth-One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth conn
InterferenceevaluatioofBluetoothandIEEE802.11bsyst
- Interference evaluation of Bluetooth and IEEE 802.11 b systems-The emergence of several radio technologies, such as Bluetooth and IEEE 802.11, operating in the 2.4 GHz unlicensed ISM frequency band, may lead to signal interference and result
MultihopscatternetformationforBluetoothnetworks1.r
- Multihop scatternet formation for Bluetooth networks-Bluetooth Paper:Multihop scatternet formation for Bluetooth networks
Partialdelaunaytriangulationanddegreelimitedlocali
- Partial delaunay triangulation and degree limited localized bluetooth scatternet formation- This paper addresses the problem of localized scatternet formation for multi-hop Bluetooth based personal area ad hoc networks. Nodes are assumed to
RendezvouslayerprotocolsforBluetooth-enabledsmartd
- Rendezvous layer protocols for Bluetooth-enabled smart devices- Communication platforms for ubiquitous computing need to be flexible, self-organizing, highly scalable and energy efficient, because in the envisioned scenarios a large number of a
Manual_Segmentation_with_3DSlicer-mj
- 详细介绍了在windows环境下如何使用3Dslicer实现手动分割功能。对于学习3dslicer有很强的指导作用。-Described in detail in the windows environment how to use manual partitioning 3Dslicer. 3dslicer learning has a strong guiding role.
Systemdirectory
- VB获得Windows各类系统目录有利于作者编写程序-VB access to Windows system directory of all types of programming in favor of the author