Sciweavers

2386 search results - page 135 / 478
» Database Security 2000
Sort
View
ICIP
2000
IEEE
15 years 11 months ago
Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking
The paper covers a method of allowing a client to browse an image to examine it in detail, while making it difficult to steal. It differs from invisible watermarking methods in th...
Cormac Herley
EUROCRYPT
2004
Springer
15 years 3 months ago
Construction of Secure Random Curves of Genus 2 over Prime Fields
For counting points of Jacobians of genus 2 curves defined over large prime fields, the best known method is a variant of Schoof’s algorithm. We present several improvements on...
Pierrick Gaudry, Éric Schost
CARDIS
2000
Springer
91views Hardware» more  CARDIS 2000»
15 years 2 months ago
Making Sense of Smart Card Security Certifications
Manufacturers and producers of smart card systems are all beginning to climb on the certification bandwagon. In this paper, we analyse the current state of smart card certificati...
Jason Reid, Mark Looi
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
15 years 1 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
TIME
2000
IEEE
15 years 2 months ago
Towards a Theory of Movie Database Queries
We present a data model for movies and movie databases. A movie is considered to be a 2-dimensional semialgebraic figure that can change in time. We give a number of computabilit...
Bart Kuijpers, Jan Paredaens, Dirk Van Gucht