Sciweavers

2599 search results - page 471 / 520
» An Operational Semantics for Knowledge Bases
Sort
View
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 3 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
SAS
2004
Springer
15 years 3 months ago
Generalized Records and Spatial Conjunction in Role Logic
Role logic is a notation for describing properties of relational structures in shape analysis, databases and knowledge bases. A natural fragment of role logic corresponds to two-va...
Viktor Kuncak, Martin C. Rinard
WISA
2004
Springer
15 years 3 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
15 years 3 months ago
Message Sense Maker: Engineering a Tool Set for Customer Relationship Management
To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages m...
Dmitri Roussinov, J. Leon Zhao
ICDAR
2003
IEEE
15 years 3 months ago
Photo time-stamp detection and recognition
This paper addresses the problem of photo time-stamp detection and recognition, which is to determine the time a photo was taken. Since the time-stamp is exposed together with the...
Xiang-Rong Chen, HongJiang Zhang