Sciweavers

138 search results - page 1 / 28
» 06371 Abstracts Collection -- From Security to Dependability
Sort
View
DAGSTUHL
2006
13 years 6 months ago
06371 Abstracts Collection -- From Security to Dependability
Christian Cachin, Felix C. Freiling, Jaap-Henk Hoe...
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
12 years 5 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
ICPR
2004
IEEE
14 years 6 months ago
A Two-Stage Approach for Segmentation and Recognition of Handwritten Digit Strings Collected from Mail Pieces
In this paper, we present an approach to interpret handwritten digit strings by employing a two-stage segmentation and recognition scheme. The first stage processing is to deal wi...
Gyeonghwan Kim, Seon-Hwa Jeong, Sungwon Park, Yunh...
SECURWARE
2008
IEEE
13 years 11 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
TIP
2011
195views more  TIP 2011»
13 years 8 days ago
Accelerating X-Ray Data Collection Using Pyramid Beam Ray Casting Geometries
Abstract—Image reconstruction from its projections is a necessity in many applications such as medical (CT), security, inspection, and others. This paper extends the 2-D Fan-beam...
Amir Averbuch, Guy Lifschitz, Yoel Shkolnisky