Sciweavers

24 search results - page 2 / 5
» Understanding the security and robustness of SIFT
Sort
View
CRITIS
2007
13 years 6 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
FC
2003
Springer
104views Cryptology» more  FC 2003»
13 years 10 months ago
On the Economics of Anonymity
Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives t...
Alessandro Acquisti, Roger Dingledine, Paul F. Syv...
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
13 years 11 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
CVIU
2010
104views more  CVIU 2010»
13 years 5 months ago
Pose estimation from multiple cameras based on Sylvester's equation
In this paper, we introduce a method to estimate the object's pose from multiple cameras. We focus on direct estimation of the 3D object pose from 2D image sequences. Scale-I...
Chong Chen, Dan Schonfeld
HOTOS
2003
IEEE
13 years 10 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh