Sciweavers

987 search results - page 197 / 198
» Analysis of the trade-offs in different modeling approaches ...
Sort
View
CCS
2010
ACM
13 years 2 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CCS
2009
ACM
14 years 17 days ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
ISVC
2009
Springer
14 years 10 days ago
Motion-Based View-Invariant Articulated Motion Detection and Pose Estimation Using Sparse Point Features
Abstract. We present an approach for articulated motion detection and pose estimation that uses only motion information. To estimate the pose and viewpoint we introduce a novel mot...
Shrinivas J. Pundlik, Stanley T. Birchfield
JAR
2000
145views more  JAR 2000»
13 years 5 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
ICSOC
2009
Springer
13 years 3 months ago
Future Research Topics in Enterprise Architecture Management - A Knowledge Management Perspective
Identifying, gathering, and maintaining information on the current, planned, and target states of the architecture of an enterprise is one major challenge of enterprise architectur...
Sabine Buckl, Florian Matthes, Christian M. Schwed...