Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Avinash L. Varna"'
Publikováno v:
IEEE Access, Vol 2, Pp 125-141 (2014)
Recent years have seen increasing popularity of storing and managing personal multimedia data using online services. Preserving confidentiality of online personal data while offering efficient functionalities thus becomes an important and pressing re
Externí odkaz:
https://doaj.org/article/58de798ae5cc497f9320bcc79312c461
Autor:
Arijit Raychowdhury, Muya Chang, Shovan Maity, Dong-Hyun Seo, Josef Danial, Sanu Mathew, Harish K. Krishnamurthy, Anupam Golder, Shreyas Sen, Avinash L. Varna, Nirmoy Modak, Debayan Das, Santosh Ghosh, Baibhab Chatterjee
Publikováno v:
IEEE Journal of Solid-State Circuits. 56:136-150
Mathematically secure cryptographic algorithms, when implemented on a physical substrate, leak critical “side-channel” information, leading to power and electromagnetic (EM) analysis attacks. Circuit-level protections involve switched capacitor,
Autor:
Arijit Raychowdhury, Josef Danial, Debayan Das, Muya Chang, Harish K. Krishnamurthy, Baibhab Chatterjee, Dong-Hyun Seo, Anupam Golder, Avinash L. Varna, Santosh Ghosh, Sanu Mathew, Shreyas Sen, Nirmoy Modak, Shovan Maity
Publikováno v:
ISSCC
Computationally-secure cryptographic algorithms when implemented on physical platforms leak critical physical signals correlated with the secret key in the form of power consumption and electromagnetic (EM) emanations. This can be exploited by an adv
Publikováno v:
IEEE Access, Vol 2, Pp 125-141 (2014)
Recent years have seen increasing popularity of storing and managing personal multimedia data using online services. Preserving confidentiality of online personal data while offering efficient functionalities thus becomes an important and pressing re
Publikováno v:
IEEE Transactions on Information Forensics and Security. 8:1417-1432
Electric Network Frequency (ENF) fluctuates slightly over time from its nominal value of 50 Hz/60 Hz. The fluctuations in ENF remain consistent across the entire power grid including when measured at physically distant geographical locations. The lig
Publikováno v:
IEEE Transactions on Information Forensics and Security. 7:717-730
Many applications of wireless sensor networks require precise knowledge of the locations of constituent nodes. In these applications, it is desirable for the nodes to be able to autonomously determine their locations before they start sensing and tra
Autor:
Avinash L. Varna, Min Wu
Publikováno v:
IEEE Transactions on Information Forensics and Security. 6:1146-1159
Multimedia identification via content fingerprints is used in many applications, such as content filtering on user-generated content websites, and automatic multimedia identification and tagging. A compact “fingerprint” is computed for each multi
Publikováno v:
IEEE Transactions on Information Forensics and Security. 4:330-345
Digital fingerprinting is a technique to deter unauthorized redistribution of multimedia content by embedding a unique identifying signal in each legally distributed copy. The embedded fingerprint can later be extracted and used to trace the originat
Publikováno v:
WIFS
Electric Network Frequency (ENF) fluctuations based forensic analysis is recently proposed for time-of-recording estimation, timestamp verification, and clip insertion/deletion forgery detection in multimedia recordings. Due to the load control mecha
Publikováno v:
ICASSP
Localization of constituent nodes is of fundamental importance in many wireless sensor networks (WSNs) related applications. Existing research has mainly investigated the problem of localization in static WSNs, where the localization is performed mai