Sciweavers

1085 search results - page 131 / 217
» A Timing Attack on RC5
Sort
View
ICPR
2010
IEEE
15 years 3 months ago
On-Line Video Recognition and Counting of Harmful Insects
This article is concerned with on-line counting of harmful insects of certain species in videos in the framework of in situ video-surveillance that aims at the early detection of ...
Ikhlef Bechar
GRID
2005
Springer
15 years 3 months ago
Protecting grid data transfer services with active network interfaces
A key goal of grid computing is to provide seamless access to shared computational and data resources across organizational boundaries, in distributed virtual organizations. Grid ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
ISAAC
2004
Springer
142views Algorithms» more  ISAAC 2004»
15 years 3 months ago
On Partial Lifting and the Elliptic Curve Discrete Logarithm Problem
It has been suggested that a major obstacle in finding an index calculus attack on the elliptic curve discrete logarithm problem lies in the difficulty of lifting points from elli...
Qi Cheng, Ming-Deh A. Huang
INCDM
2010
Springer
152views Data Mining» more  INCDM 2010»
15 years 1 months ago
Spam Email Filtering Using Network-Level Properties
Abstract. Spam is serious problem that affects email users (e.g. phishing attacks, viruses and time spent reading unwanted messages). We propose a novel spam email filtering appr...
Paulo Cortez, André Correia, Pedro Sousa, M...
AVI
2006
14 years 11 months ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...