Sciweavers

2180 search results - page 336 / 436
» Algorithms for discovering bucket orders from data
Sort
View
90
Voted
ASIACRYPT
2007
Springer
15 years 7 months ago
Symmetric Key Cryptography on Modern Graphics Hardware
Abstract. GPUs offer a tremendous amount of computational bandwidth that was until now largely unusable for cryptographic computations due to a lack of integer arithmetic and user...
Jason Yang, James Goodman
SACRYPT
2007
Springer
167views Cryptology» more  SACRYPT 2007»
15 years 6 months ago
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...
ISPASS
2005
IEEE
15 years 6 months ago
Performance Analysis of a New Packet Trace Compressor based on TCP Flow Clustering
In this paper we study the properties of a new packet trace compression method based on clustering of TCP flows. With our proposed method, the compression ratio that we achieve i...
Raimir Holanda, Javier Verdú, Jorge Garc&ia...
121
Voted
ICNC
2005
Springer
15 years 6 months ago
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection
The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing intrusion detection systems. But the presence...
Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun ...
96
Voted
MLMI
2005
Springer
15 years 6 months ago
Projective Kalman Filter: Multiocular Tracking of 3D Locations Towards Scene Understanding
Abstract. This paper presents a novel approach to the problem of estimating and tracking 3D locations of multiple targets in a scene using measurements gathered from multiple calib...
Cristian Canton-Ferrer, Josep R. Casas, A. Murat T...