We describe a method for efficiently hashing multiple messages of different lengths. Such computations occur in various scenarios, and one of them is when an op
This paper introduces and evaluates the performance of a novel cipher scheme, Ambiguous Multi-Symmetric Cryptography (AMSC), which conceals multiple coherent pl
This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain. The algorithm is applied for
This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. T
Information leaks through regular fiber optic communications is possible in the form of eavesdropping on conversations, using standard fiber optic communication