Sciweavers

1527 search results - page 219 / 306
» A Survey of Web Security
Sort
View
ICMCS
2006
IEEE
112views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Where was the Picture Taken: Image Localization in Route Panoramas Using Epipolar Geometry
Finding the location where a picture was taken is an important problem for a variety of applications including surveying, interactive traveling and homeland security among others....
Saad M. Khan, Fahd Rafi, Mubarak Shah
AES
2004
Springer
151views Cryptology» more  AES 2004»
15 years 4 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
SISW
2003
IEEE
15 years 4 months ago
Cryptographic File Systems Performance: What You Don't Know Can Hurt You
Securing data is more important than ever, yet cryptographic file systems still have not received wide use. One barrier to the adoption of cryptographic file systems is that the...
Charles P. Wright, Jay Dave, Erez Zadok
ELPUB
2003
ACM
15 years 4 months ago
Building a Federated, Online Social Sciences and Humanities Database of Journals and Research Communication: A Canadian Initiati
: Synergies is an emerging online Canadian publishing project in the social sciences and humanities that builds on a group of online publishing initiatives that have emerged over t...
Rowland Lorimer, Richard Smith
AOIS
2003
15 years 24 days ago
I-MINDS: An Agent-Oriented Information System for Applications in Education
Abstract. In this paper, we describe an Intelligent Multiagent Infrastructure for Distributed Systems in Education (or I-MINDS) framework that applies an agent-oriented information...
Leen-Kiat Soh, Xuli Liu, XueSong Zhang, Jameela Al...