Sciweavers

150 search results - page 21 / 30
» Coherency Sensitive Hashing
Sort
View
DASFAA
2007
IEEE
143views Database» more  DASFAA 2007»
15 years 6 months ago
Using Redundant Bit Vectors for Near-Duplicate Image Detection
Images are amongst the most widely proliferated form of digital information due to affordable imaging technologies and the Web. In such an environment, the use of digital watermar...
Jun Jie Foo, Ranjan Sinha
AMR
2007
Springer
197views Multimedia» more  AMR 2007»
15 years 6 months ago
How to Use SIFT Vectors to Analyze an Image with Database Templates
During last years, local image descriptors have received much attention because of their efficiency for several computer vision tasks such as image retrieval, image comparison, fea...
Adrien Auclair, Laurent D. Cohen, Nicole Vincent
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
15 years 5 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
ARCS
2004
Springer
15 years 5 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
SIGCOMM
2003
ACM
15 years 5 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson