Sciweavers

1085 search results - page 215 / 217
» A Timing Attack on RC5
Sort
View
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
15 years 1 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
ISSA
2004
15 years 1 months ago
Using A Central Data Repository For Biometric Authentication In Passport Systems
Passports and visas are currently undergoing a rapid change due to legislation being passed by authorities such as the US requirement that they should have machine readable biomet...
Morné Breedt
109
Voted
ESORICS
2010
Springer
15 years 23 days ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik
90
Voted
ICMCS
2010
IEEE
149views Multimedia» more  ICMCS 2010»
14 years 12 months ago
Single-view recaptured image detection based on physics-based features
In daily life, we can see images of real-life objects on posters, television, or virtually any type of smooth physical surfaces. We seldom confuse these images with the objects pe...
Xinting Gao, Tian-Tsong Ng, Bo Qiu, Shih-Fu Chang
91
Voted
AI
2007
Springer
14 years 11 months ago
Computational properties of argument systems satisfying graph-theoretic constraints
One difficulty that arises in abstract argument systems is that many natural questions regarding argument acceptability are, in general, computationally intractable having been c...
Paul E. Dunne