Sciweavers

120 search results - page 6 / 24
» Data Hiding: Current Status and Key Issues
Sort
View
ACSAC
1998
IEEE
15 years 1 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
EDBTW
2010
Springer
15 years 4 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
ASIACRYPT
2010
Springer
14 years 7 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
84
Voted
SC
2009
ACM
15 years 4 months ago
Terascale data organization for discovering multivariate climatic trends
Current visualization tools lack the ability to perform fullrange spatial and temporal analysis on terascale scientific datasets. Two key reasons exist for this shortcoming: I/O ...
Wesley Kendall, Markus Glatter, Jian Huang, Tom Pe...
81
Voted
ICWSM
2010
14 years 11 months ago
Social Intellisense: A Task-Embedded Interface to Folksonomies
We present an application for accessing and creating socially constructed sets of information. Users store and retrieve information, such as bits of text, through the use of "...
Scott Counts, Kristie Fisher, Aaron Hoff