Sciweavers

104 search results - page 21 / 21
» The Emperor's New Security Indicators
Sort
View
ICC
2007
IEEE
110views Communications» more  ICC 2007»
13 years 11 months ago
Resource Optimization to Provision a Virtual Private Network Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. With increase in number and size of VPNs, providers nee...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja
ASIACRYPT
2005
Springer
13 years 11 months ago
Adapting Density Attacks to Low-Weight Knapsacks
Cryptosystems based on the knapsack problem were among the first public-key systems to be invented. Their high encryption/decryption rate attracted considerable interest until it ...
Phong Q. Nguyen, Jacques Stern
OSDI
1996
ACM
13 years 6 months ago
Microkernels Meet Recursive Virtual Machines
This paper describes a novel approach to providingmodular and extensible operating system functionality and encapsulated environments based on a synthesis of microkernel and virtu...
Bryan Ford, Mike Hibler, Jay Lepreau, Patrick Tull...
CVIU
2007
240views more  CVIU 2007»
13 years 5 months ago
Objective evaluation of approaches of skin detection using ROC analysis
Skin detection is an important indicator of human presence and actions in many domains, including interaction, interfaces and security. It is commonly performed in three steps: tr...
Stephen Schmugge, Sriram Jayaram, Min C. Shin, Leo...