Search
Now showing items 1-3 of 3
Collusion resistant fingerprinting
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Digital watermarking is used to carry information by embedding information into the
cover data in a perceptually visible or non visible manner. In today's sea of digital
information, there are many problems associated ...
Efficient ASIC implementation of advanced encryption standard
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
Modeling and detecting attacks against key agreement protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
Key agreement protocols establish a shared secret key between two or more communicating
parties willing to exchange data over insecure channels using symmetric key cryptography.
Based on the number of members involved ...