Sciweavers

10 search results - page 1 / 2
» On the (Im)Possibility of Practical and Secure Nonlinear Fil...
Sort
View
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
13 years 9 months ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano
ISCAS
1994
IEEE
131views Hardware» more  ISCAS 1994»
13 years 8 months ago
An Efficient Design Method for Optimal Weighted Median Filtering
Earlier research has shown that the problem of optimal weighted median filtering with structural constraints can be formulated as a nonconvex nonlinear programming problem in gene...
Ruikang Yang, Moncef Gabbouj, Yrjö Neuvo
CONEXT
2007
ACM
13 years 8 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
USITS
2003
13 years 5 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen
DAS
2008
Springer
13 years 6 months ago
Difference of Boxes Filters Revisited: Shadow Suppression and Efficient Character Segmentation
A robust segmentation is the most important part of an automatic character recognition system (e.g. document processing, license plate recognition etc.). In our contribution we pr...
Erik Rodner, Herbert Süße, Wolfgang Ort...