Sciweavers

138 search results - page 1 / 28
» 06371 Abstracts Collection -- From Security to Dependability
Sort
View
DAGSTUHL
2006
13 years 6 months ago
06371 Abstracts Collection -- From Security to Dependability
Christian Cachin, Felix C. Freiling, Jaap-Henk Hoe...
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
12 years 4 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
ICPR
2004
IEEE
14 years 6 months ago
A Two-Stage Approach for Segmentation and Recognition of Handwritten Digit Strings Collected from Mail Pieces
In this paper, we present an approach to interpret handwritten digit strings by employing a two-stage segmentation and recognition scheme. The first stage processing is to deal wi...
Gyeonghwan Kim, Seon-Hwa Jeong, Sungwon Park, Yunh...
SECURWARE
2008
IEEE
13 years 11 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
TIP
2011
195views more  TIP 2011»
12 years 12 months ago
Accelerating X-Ray Data Collection Using Pyramid Beam Ray Casting Geometries
Abstract—Image reconstruction from its projections is a necessity in many applications such as medical (CT), security, inspection, and others. This paper extends the 2-D Fan-beam...
Amir Averbuch, Guy Lifschitz, Yoel Shkolnisky