#### Filter Results:

- Full text PDF available (27)

#### Publication Year

1990

2017

- This year (0)
- Last 5 years (7)
- Last 10 years (12)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Clifford Bergman, Jennifer Davidson
- Security, Steganography, and Watermarking ofâ€¦
- 2005

Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Mostâ€¦ (More)

- George T. Amariucai, Clifford Bergman, Yong Guan
- RFIDSec
- 2011

This paper introduces the Adopted-Pet (AP) protocol, an automatic (i.e. requiring no human interaction) secure pairing protocol, adequate for the pairing between a passive RFID tag and a reader. Mostâ€¦ (More)

This paper considers the lattice of subquasivarieties of a regular variety. In particular we show that if V is a strongly irregular variety that is minimal as a quasivariety, then the smallestâ€¦ (More)

- Clifford Bergman, David Juedes, Giora Slutzki
- IJAC
- 1999

Two algebraic structures with the same universe are called term-equivalent if they have the same clone of term operations. We show that the problem of determining whether two finite algebras ofâ€¦ (More)

- Clifford Bergman, Giora Slutzki
- SIAM J. Comput.
- 2000

In this paper we consider the complexity of several problems involving finite algebraic structures. Given finite algebras A and B, these problems ask the following. (1) Do A and B satisfy preciselyâ€¦ (More)

A congruence relation Î¸ on an algebra A is fully invariant if every endomorphism of A preserves Î¸. A congruence Î¸ is verbal if there exists a variety V such that Î¸ is the least congruence of A suchâ€¦ (More)

Two algebraic structures A and B are called categorically equivalent if there is a functor from the variety generated by A to the variety generated by B, carrying A to B, that is an equivalence ofâ€¦ (More)

Hiding messages in image data, called steganography, is used for both legal and illicit purposes. The detection of hidden messages in image data stored on websites and computers, called steganalysis,â€¦ (More)

- Jacob Manske, Maria Axenovich, +4 authors Eric Weber
- 2010

ii DEDICATION To M. and D., for making me who I am today. iii If people did not sometimes do silly things, nothing intelligent would ever get done. There's no ulterior practical purpose here. I'mâ€¦ (More)

A description of all varieties categorically equivalent to a fixed finitely generated variety of modes is provided. The characterization is in terms of a set of basic operations symbols andâ€¦ (More)