Sciweavers

24529 search results - page 406 / 4906
» Computing on Authenticated Data
Sort
View
AUSFORENSICS
2004
15 years 6 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
JCP
2008
216views more  JCP 2008»
15 years 4 months ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng
TOG
2008
128views more  TOG 2008»
15 years 4 months ago
VirtualStudio2Go: digital video composition for real environments
We synchronize film cameras and LED lighting with off-the-shelf video projectors. Radiometric compensation allows displaying keying patterns and other spatial codes on arbitrary r...
Anselm Grundhöfer, Oliver Bimber
RTA
2010
Springer
15 years 8 months ago
Automata for Data Words and Data Trees
Data words and data trees appear in verification and XML processing. The term “data” means that positions of the word, or tree, are decorated with elements of an infinite set...
Mikolaj Bojanczyk
ICPR
2008
IEEE
15 years 11 months ago
An approximate algorithm for median graph computation using graph embedding
Graphs are powerful data structures that have many attractive properties for object representation. However, some basic operations are difficult to define and implement, for ins...
Miquel Ferrer, Ernest Valveny, Francesc Serratosa,...