Sciweavers

6195 search results - page 96 / 1239
» Cloud Computing Security
Sort
View
IACR
2011
124views more  IACR 2011»
14 years 3 months ago
Using the Cloud to Determine Key Strengths
We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the mos...
Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Ni...
STOC
2004
ACM
94views Algorithms» more  STOC 2004»
16 years 4 months ago
Completeness in two-party secure computation: a computational view
Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen
152
Voted
CCGRID
2009
IEEE
15 years 1 months ago
A Live Storage Migration Mechanism over WAN for Relocatable Virtual Machine Services on Clouds
IaaS (Infrastructure-as-a-Service) is an emerging concept of cloud computing, which allows users to obtain hardware resources from virtualized datacenters. Although many commercial...
Takahiro Hirofuchi, Hirotaka Ogawa, Hidemoto Nakad...
CVPR
2006
IEEE
16 years 5 months ago
Fully Automatic Registration of 3D Point Clouds
We propose a novel technique for the registration of 3D point clouds which makes very few assumptions: we avoid any manual rough alignment or the use of landmarks, displacement ca...
Ameesh Makadia, Alexander Patterson, Kostas Daniil...
CVPR
2008
IEEE
16 years 5 months ago
Automatic symmetry plane estimation of bilateral objects in point clouds
In this paper, the problem of estimating automatically the symmetry plane of bilateral objects (having perfect or imperfect mirror symmetry) in point clouds is reexamined. Classic...
Benoît Combès, John Waddington, Neil ...