Sciweavers

2474 search results - page 492 / 495
» Attacks on Steganographic Systems
Sort
View
JAR
2000
145views more  JAR 2000»
14 years 9 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
110
Voted
VLDB
2002
ACM
116views Database» more  VLDB 2002»
14 years 9 months ago
Watermarking Relational Databases
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking,...
Rakesh Agrawal, Jerry Kiernan
MEDIAFORENSICS
2010
14 years 8 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
ICDM
2009
IEEE
259views Data Mining» more  ICDM 2009»
14 years 7 months ago
Topic Modeling for Sequences of Temporal Activities
: Topic Modeling for Sequences of Temporal Activities Zhi-Yong Shen, Ping Luo, Yuhong Xiong, Jun Sun, Yi-Dong Shen HP Laboratories HPL-2010-160 topic modeling, LDA, sequence, temp...
Zhiyong Shen, Ping Luo, Yuhong Xiong, Jun Sun, Yi-...
103
Voted
IR
2010
14 years 6 months ago
Sentence-level event classification in unstructured texts
The ability to correctly classify sentences that describe events is an important task for many natural language applications such as Question Answering (QA) and Text Summarisation....
Martina Naughton, Nicola Stokes, Joe Carthy