Sciweavers

1166 search results - page 156 / 234
» Adaptively Secure Broadcast
Sort
View
79
Voted
ICPR
2006
IEEE
16 years 1 months ago
GMM-based SVM for face recognition
A new face recognition algorithm is presented. It supposes that a video sequence of a person is available both at enrollment and test time. During enrollment, a client Gaussian Mi...
Gérard Chollet, Hervé Bredin, Najim ...
134
Voted
DASC
2006
IEEE
15 years 6 months ago
Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services
Abstract— This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication perform...
Philip K. McKinley, Farshad A. Samimi, Jonathan K....
102
Voted
CRYPTO
2003
Springer
95views Cryptology» more  CRYPTO 2003»
15 years 5 months ago
Plaintext Awareness via Key Registration
Abstract. In this paper, we reconsider the notion of plaintext awareness. We present a new model for plaintext-aware encryption that is both natural and useful. We achieve plaintex...
Jonathan Herzog, Moses Liskov, Silvio Micali
ISW
2001
Springer
15 years 5 months ago
Suitability of a Classical Analysis Method for E-commerce Protocols
We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
Sigrid Gürgens, Javier Lopez
ASIACRYPT
2006
Springer
15 years 4 months ago
KFC - The Krazy Feistel Cipher
We introduce KFC, a block cipher based on a three round Feistel scheme. Each of the three round functions has an SPN-like structure for which we can either compute or bound the adv...
Thomas Baignères, Matthieu Finiasz