Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Piotr Syga"'
Publikováno v:
IEEE Access, Vol 10, Pp 85368-85383 (2022)
Businesses are slowly replacing Universal Product Code (barcodes used for tracking items) with radio-frequency identification (RFID). Unlike a barcode, RFID tag does not need to be within the line of sight of the reader, and can be interrogated from
Externí odkaz:
https://doaj.org/article/1bdd404321d848aeb9dcf02c5100487a
Audio DeepFakes allow the creation of high-quality, convincing utterances and therefore pose a threat due to its potential applications such as impersonation or fake news. Methods for detecting these manipulations should be characterized by good gene
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f01fe1c0f2cd8b159b040ffaed7b1ef3
Publikováno v:
IEEE Transactions on Biomedical Engineering. 66:1422-1428
Objective: A fully automated method for delineation of the lamina cribrosa in optical coherence tomography (OCT) is proposed. It assesses the three-dimensional (3D) shape of the lamina cribrosa in-vivo , based on a series of OCT B-scans. Methods: The
Publikováno v:
Ad Hoc Networks. 84:90-106
We consider an ad hoc radio network in which nodes perform some distributed algorithms. We provide a framework, that at the cost of increasing time complexity, prevents an outer, passive adversary from gaining significant information about the execut
Publikováno v:
Security of Ubiquitous Computing Systems ISBN: 9783030105907
In this chapter we focus on two important security challenges that naturally emerge for large scale systems composed of cheap devices implementing only symmetric cryptographic algorithms. First, we consider threats due to poor or malicious implementa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e80b7a10276f7583f98bda896b8c87c3
https://doi.org/10.1007/978-3-030-10591-4_1
https://doi.org/10.1007/978-3-030-10591-4_1
Autor:
Piotr Syga, Piotr Kawa
Publikováno v:
SECRYPT
Autor:
Piotr Syga, Marcin Plata
Publikováno v:
TrustCom
Watermarking is an operation of embedding an information into an image in a way that allows to identify ownership of the image despite applying some distortions on it. In this paper, we presented a novel end-to-end solution for embedding and recoveri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7cc39ad5e3b2aeb58931f89c31069ab1
Publikováno v:
ICETE (2)
Publikováno v:
International Journal of Information Security. 18:285-304
In this paper, we propose a fault-tolerant privacy-preserving data aggregation protocol which utilizes limited local communication between nodes. As a starting point, we analyze the Binary Protocol presented by Chan et al. Comparing to previous work,
Publikováno v:
Pattern Recognition. 73:189-201
Bioidentification is one of the most popular methods of user identification, one of the reasons is the fact that the ‘access tokens’ are part of user’s body and cannot be simply lost or forgotten. Recently, the popularity of biometric methods i