Year of Publication: 2014

J. R. Troncoso-Pastoriza and Caputo, S., Bootstrap-based Proxy Reencryption for Private Multi-user Computing, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.PDF icon TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
C. Pasquini, Pérez-González, F., and Boato, G., A Benford-Fourier JPEG compression detector, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014.PDF icon benford_icip_rice_new.pdf (235.58 KB)
C. Pasquini, Boato, G., and Pérez-González, F., Multiple JPEG compression detection by means of Benford-Fourier coefficients, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
P. Comesaña and Pérez-González, F., The optimal attack to histogram-based forensic detectors is simple(x), in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.PDF icon wifs14.pdf (265.04 KB)
J. F. Schmidt and López-Valcarce, R., Detecting Misreporting Attacks to the Proportional Fair Scheduler, in IEEE Workshop on Information Forensics and Security (WIFS), Atlanta, USA, 2014.PDF icon GlobalSIP_2014.pdf (326.68 KB)