Sciweavers

556 search results - page 58 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
ICIP
2009
IEEE
16 years 26 days ago
Age Regression From Faces Using Random Forests
Predicting the age of a person through face image analysis holds the potential to drive an extensive array of real world applications from human computer interaction and security ...
ICCS
2007
Springer
15 years 6 months ago
Modeling of Carrier Transport in Nanowires
Abstract. We consider a physical model of ultrafast evolution of an initial electron distribution in a quantum wire. The electron evolution is described by a quantum-kinetic equati...
Todor V. Gurov, Emanouil I. Atanassov, Mihail Nedj...
ISPEC
2009
Springer
15 years 6 months ago
On the Correctness of an Approach against Side-Channel Attacks
Abstract. Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec’07] proposed an approach against side-channel attacks, which states that a symmetri...
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
JVA
2006
IEEE
15 years 5 months ago
Programming Models for Grid Applications and Systems: Requirements and Approaches
History repeats itself. Since the invention of the programmable computer, numerous computer scientists keep dedicating their professional lives to the design of “the single, bes...
Thilo Kielmann
EUROCRYPT
2004
Springer
15 years 5 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer