My ICASSP 2017 Schedule
Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
- Create a login based on your email (takes less than one minute)
- Perform 'Paper Search'
- Select papers that you desire to save in your personalized schedule
- Click on 'My Schedule' to see the current list of selected papers
- Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)
Paper Detail
Paper: | IFS-P1.2 | ||
Session: | Information Forensics and Security II | ||
Session Time: | Monday, March 6, 13:30 - 15:30 | ||
Presentation Time: | Monday, March 6, 13:30 - 15:30 | ||
Presentation: | Poster | ||
Topic: | Information Forensics and Security: Watermarking and Steganography | ||
Paper Title: | Designing secure networks with q-composite key predistribution under different link constraints | ||
Authors: | Jun Zhao; Carnegie Mellon University, Arizona State University, and Princeton University |