Sciweavers

1513 search results - page 139 / 303
» Cryptographic Pattern Matching
Sort
View
GIS
2010
ACM
15 years 27 days ago
Efficiently locating photographs in many panoramas
We present a method for efficient and reliable geo-positioning of images. It relies on image-based matching of the query images onto a trellis of existing images that provides acc...
Michael Kroepfl, Yonatan Wexler, Eyal Ofek
117
Voted
ASM
2003
ASM
15 years 7 months ago
Privacy, Abstract Encryption and Protocols: An ASM Model - Part I
d in Abstract State Machines – Advances in Theory and Applications: 10th International Workshop, ASM 2003, volume 2589 of LNCS, Springer–Verlag. Abstract Encryption and Protoco...
Dean Rosenzweig, Davor Runje, Neva Slani
CCS
2009
ACM
16 years 2 months ago
Quantifying maximal loss of anonymity in protocols
There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
Han Chen, Pasquale Malacaria
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
128
Voted
ASIACRYPT
2011
Springer
14 years 2 months ago
Cryptanalysis of ARMADILLO2
ARMADILLO2 is the recommended variant of a multi-purpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper we propose a me...
Mohamed Ahmed Abdelraheem, Céline Blondeau,...