Sciweavers

340 search results - page 29 / 68
» Cryptography: An Art and Science
Sort
View
82
Voted
IEEEIAS
2007
IEEE
15 years 3 months ago
Computational Forensics: Towards Hybrid-Intelligent Crime Investigation
In recent years, mathematical, statistical and computer science methods have found extensive application in developing new procedures for crime investigation, prosecution and the ...
Katrin Franke, Sargur N. Srihari
GI
2009
Springer
15 years 2 months ago
Mobile computing in mass casualty incidents (MCIs)
: This paper illustrates the future role of mobile computing for the response in emergencies and mass casualty incidents (MCIs). Furthermore it describes the different components a...
Simon Nestler, Gudrun Klinker
CAD
2006
Springer
14 years 9 months ago
Fast computation of inertia through affinely extended Euler tensor
We introduce an affine extension of the Euler tensor which encompasses all of the inertia properties of interest in a convenient linear format, and we show how it transforms under...
Antonio DiCarlo, Alberto Paoluzzi
STACS
2010
Springer
15 years 4 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern
TCC
2009
Springer
112views Cryptology» more  TCC 2009»
15 years 10 months ago
Non-malleable Obfuscation
Existing definitions of program obfuscation do not rule out malleability attacks, where an adversary that sees an obfuscated program is able to generate another (potentially obfus...
Ran Canetti, Mayank Varia