Sciweavers

1186 search results - page 76 / 238
» A New Approach to Secure Logging
Sort
View
97
Voted
ICIP
2009
IEEE
16 years 1 months ago
Fast And Robust Dominant Points Detection On Digital Curves
A new and fast method for dominant point detection and polygonal representation of a discrete curve is proposed. Starting from results of discrete geometry [1, 2], the notion of m...
105
Voted
EUROCRYPT
2004
Springer
15 years 6 months ago
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
At Eurocrypt ’96, Coppersmith proposed an algorithm for finding small roots of bivariate integer polynomial equations, based on lattice reduction techniques. But the approach is...
Jean-Sébastien Coron
131
Voted
ICWSM
2009
14 years 10 months ago
Navigation Patterns from and to Social Media
With the rapid rise of social media content, the question how people navigate to and from social media becomes important in order to understand what new tools and approaches are m...
Michael Gamon, Arnd Christian König
79
Voted
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
15 years 5 months ago
Security Evaluation of Asynchronous Circuits
Abstract. Balanced asynchronous circuits have been touted as a superior replacement for conventional synchronous circuits. To assess these claims, we have designed, manufactured an...
Jacques J. A. Fournier, Simon W. Moore, Huiyun Li,...
101
Voted
ISTA
2004
15 years 1 months ago
On a Network Forensics Model For Information Security
: The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Networ...
Wei Ren