Filter your results
- 5
- 5
- 5
- 5
- 2
- 3
- 1
- 1
- 2
- 2
- 1
- 1
- 6
- 5
- 1
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Automating Video File Carving and Content Identification9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.195-212, ⟨10.1007/978-3-642-41148-9_14⟩
Conference papers
hal-01460607v1
|
||
|
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.95-104, ⟨10.1007/978-3-642-40779-6_7⟩
Conference papers
hal-01492836v1
|
||
|
Hash-Based File Content Identification Using Distributed Systems9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.119-134, ⟨10.1007/978-3-642-41148-9_8⟩
Conference papers
hal-01460625v1
|
||
|
Preserving Confidentiality in Component Compositions12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.33-48, ⟨10.1007/978-3-642-39614-4_3⟩
Conference papers
hal-01492775v1
|
||
|
Robust Hash Algorithms for Text14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers
hal-01492815v1
|