Sciweavers

6404 search results - page 1016 / 1281
» Blocks
Sort
View
CRYPTO
2008
Springer
120views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed...
Jean-Sébastien Coron, Jacques Patarin, Yann...
CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
15 years 6 months ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...
DAS
2008
Springer
15 years 6 months ago
Accurate Alignment of Double-Sided Manuscripts for Bleed-Through Removal
Double-sided manuscripts are often degraded by bleedthrough interference. Such degradation must be corrected to facilitate human perception and machine recognition. Most approache...
Jie Wang, Michael S. Brown, Chew Lim Tan
DAS
2008
Springer
15 years 6 months ago
An Efficient Edge Based Technique for Text Detection in Video Frames
Both graphic text and scene text detection in video images with complex background and low resolution is still a challenging and interesting problem for researchers in the field o...
Palaiahnakote Shivakumara, Weihua Huang, Chew Lim ...
DEXA
2008
Springer
176views Database» more  DEXA 2008»
15 years 6 months ago
Inventing Less, Reusing More, and Adding Intelligence to Business Process Modeling
Recently, a variety of workflow patterns has been proposed focusing on specific aspects like control flow, data flow, and resource assignments. Though these patterns are relevant f...
Lucinéia Heloisa Thom, Manfred Reichert, Ca...
« Prev « First page 1016 / 1281 Last » Next »