Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Helena Bruyninckx"'
Publikováno v:
17th International Conference on Availability, Reliability and Security (ARES 2022)
17th International Conference on Availability, Reliability and Security (ARES 2022), Aug 2022, Vienna, Austria
Proceedings of the 17th International Conference on Availability, Reliability and Security
17th International Conference on Availability, Reliability and Security (ARES 2022), Aug 2022, Vienna, Austria
Proceedings of the 17th International Conference on Availability, Reliability and Security
International audience; This paper presents the general goals of Horizon 2020 project UNCOVER , whose overall purpose is to close the gap between academic work and operational needs in the fields of data-hiding. While digital data-hiding is a relativ
Publikováno v:
IH&MMSec '18 Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security
IH-MMSEC
IH-MMSEC, Jun 2018, Innsbruck, Austria. pp.17-22, ⟨10.1145/3206004.3206021⟩
IH&MMSec
IH-MMSEC
IH-MMSEC, Jun 2018, Innsbruck, Austria. pp.17-22, ⟨10.1145/3206004.3206021⟩
IH&MMSec
International audience; This short paper investigates the influence of the image processing pipeline (IPP) on the cover-source mismatch (CSM) for the popular JPHide steganographic scheme. We propose to deal with CSM by combining a forensics and a ste
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9bf79178c9171db1bb5e6bb7abcfe10c
https://hal.archives-ouvertes.fr/hal-01833873
https://hal.archives-ouvertes.fr/hal-01833873
Publikováno v:
Journal of Computational and Applied Mathematics. 278:48-51
Previously, we studied methods to solve the coupled system of non-linear equations F ( g ) = p and S ( p ) = g . In this paper we take a closer look at two of them, the Quasi-Newton method with Least Squares Jacobian (QN-LS) and the Block Quasi-Newto
Publikováno v:
Journal of Computational and Applied Mathematics. 273:25-28
We show how the quasi-Newton least squares method (QN-LS) relates to Krylov subspace methods in general and to GMRes in particular.
Publikováno v:
Journal of Computational and Applied Mathematics. 257:129-131
We show that, for an affine problem, the approximate Jacobian of the Quasi-Newton-Least Squares method cannot become singular before the solution has been reached.
Autor:
Dirk Van Heule, Helena Bruyninckx
Publikováno v:
ICC
Unconditionally secure authentication schemes with an arbiter have been proposed in the literature. We extend this idea in the context of quantum authentication. In this paper, we present an unconditionally secure authentication scheme with an arbite
Publikováno v:
ICC
The security of many cryptographic applications relies heavily on the quality of the random numbers used. Therefore, random number generation is one of the most critical primitives for cryptography. This paper focuses on true random number generators