Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2021
Reversible selective embedding for DICOM image security and integrity using visual cryptography
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 13, Issue 5Pages 498–514https://doi.org/10.1504/ijesdf.2021.117306Information security has been one of the biggest challenges in the era of telemedicine applications. To protect the patient's private records in medical images, several traditional methods are used. One of them is hiding the sensitive part of the image by ...
- ArticleNovember 2012
An efficient detection model of selective forwarding attacks in wireless mesh networks
IDCS'12: Proceedings of the 5th international conference on Internet and Distributed Computing SystemsPages 1–14https://doi.org/10.1007/978-3-642-34883-9_1Wireless communications technologies have seen a great degree of advancements and sophistication in the past decade. Different research works have tried to solve various issues related to different wireless Ad hoc networks, many of which are yet to find ...
- ArticleDecember 2009
Pairing-based nominative signatures with selective and universal convertibility
Inscrypt'09: Proceedings of the 5th international conference on Information security and cryptologyPages 60–74A nominative signature scheme allows a nominator and a nominee jointly generate a signature in such a way that only the nominee can check the validity of the signature and further convince a third party of the fact. In Inscrypt 2008, Zhao et al. ...
- articleMay 2004
Selective electroless copper plating micro-coil assisted by 248 nm excimer laser
Microelectronic Engineering (MCEE), Volume 71, Issue 3-4Pages 242–251https://doi.org/10.1016/j.mee.2003.12.003In the study, template of micro-coil patterns created by the excimer laser and activated by reactants for electroless copper plating is described. The generated micro-coil patterns are transformed into copper patterns on the substrate and formed copper ...
- ArticleJanuary 2003
Selective memoization
POPL '03: Proceedings of the 30th ACM SIGPLAN-SIGACT symposium on Principles of programming languagesPages 14–25https://doi.org/10.1145/604131.604133We present a framework for applying memoization selectively. The framework provides programmer control over equality, space usage, and identification of precise dependences so that memoization can be applied according to the needs of an application. Two ...
Also Published in:
ACM SIGPLAN Notices: Volume 38 Issue 1 - articleApril 2001