Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,235,097 papers from all fields of science
Search
Sign In
Create Free Account
Double encoding
Double encoding is an attack technique used to bypass security mechanisms which only decode data once. It can be used to masquerade a directory…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Cross-site scripting
Directory traversal attack
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding
N. Teraura
,
I. Echizen
,
Keiichi Iwamura
International Conference on Innovative Mobile and…
2019
Corpus ID: 195353167
The current version of a quick response (QR) code can be easily created by anyone and then used to perform an impersonation or…
Expand
2018
2018
Double Encoding - Slow Decoding Image to Image CNN for Foreground Identification with Application Towards Intelligent Transportation
Thangarajah Akilan
,
Jonathan Wu
IEEE International Conference on Internet of…
2018
Corpus ID: 174801797
The vision-based foreground (FG) identification approaches are in great demand to intelligent transportation applications. Here…
Expand
2018
2018
An Image Recognition Processor with Time-domain Accelerators using Efficient Time Encoding and Non-linear Logic Operation
Zhengyu Chen
,
Jie Gu
International Symposium on Security in Computing…
2018
Corpus ID: 53582153
This paper presents novel time-domain circuit techniques including double encoding strategy, shared time generator (TG) and bit…
Expand
Review
2017
Review
2017
Geographic graph construction and visualization
Quirijn W. Bouts
2017
Corpus ID: 67164663
• A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences…
Expand
2017
2017
Performance Analysis of Wireless Network Maximum Throughput Based on Network Coding
Maping Li
International Conference on Information Science…
2017
Corpus ID: 21798094
Network coding has shown the promise of significance throughput improvement. In this paper, we study the throughput of two-hop…
Expand
2016
2016
Constraint Decomposition Based on Tractable Properties
Achref El Mouelhi
IEEE International Conference on Tools with…
2016
Corpus ID: 18657001
Identifying tractable classes of constraint satisfaction problems (CSPs) has been studied over the past two decades, and is now a…
Expand
2015
2015
Abstract probabilistic CNOT gate model based on double encoding: study of the errors and physical realizability
A. Gueddana
,
M. Attia
,
R. Chatta
Photonics West - Optoelectronic Materials and…
2015
Corpus ID: 123105006
In this work, we study the error sources standing behind the non-perfect linear optical quantum components composing a non…
Expand
2013
2013
Non-deterministic quantum CNOT gate with double encoding
A. Gueddana
,
M. Attia
,
R. Chatta
Optics & Photonics - Optical Engineering…
2013
Corpus ID: 119707106
We define an Asymmetric Partially Polarizing Beam Splitter (APPBS) to be a linear optical component having different reflectivity…
Expand
1999
1999
Modelling the Golomb Ruler
ProblemBarbara
,
M. Smith
,
Kostas Stergiou
,
T. Walsh
1999
Corpus ID: 17913468
The Golomb ruler problem has been proposed as a challenging constraint satisfaction problem. We consider a large number of…
Expand
1982
1982
On decoding methods for double-encoding systems
H. Imai
,
Yasuji Nagasaka
1982
Corpus ID: 62055449
Double encoding is a method by which a new code is constructed by twofold encoding with two codes. Using this method, a code with…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE