Sciweavers

3134 search results - page 359 / 627
» Computing full disjunctions
Sort
View
93
Voted
APGV
2004
ACM
141views Visualization» more  APGV 2004»
15 years 4 months ago
The effects of head-mounted display mechanics on distance judgments in virtual environments
In virtual environments that use head-mounted displays (HMD), distance judgments to targets on the ground are compressed, at least when indicated through visually-directed walking...
Peter Willemsen, Mark B. Colton, Sarah H. Creem-Re...
97
Voted
CCS
2006
ACM
15 years 4 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
94
Voted
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 4 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
88
Voted
EUROCRYPT
2004
Springer
15 years 4 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
106
Voted
FGR
2004
IEEE
159views Biometrics» more  FGR 2004»
15 years 4 months ago
Null Space-based Kernel Fisher Discriminant Analysis for Face Recognition
The null space-based LDA takes full advantage of the null space while the other methods remove the null space. It proves to be optimal in performance. From the theoretical analysi...
Wei Liu, Yunhong Wang, Stan Z. Li, Tieniu Tan