Sciweavers

2775 search results - page 486 / 555
» Differencing Data Streams
Sort
View
INDOCRYPT
2007
Springer
15 years 3 months ago
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy, Py...
Gautham Sekar, Souradyuti Paul, Bart Preneel
RAID
2007
Springer
15 years 3 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
3DPVT
2006
IEEE
167views Visualization» more  3DPVT 2006»
15 years 3 months ago
Hierarchical Representation of Virtual Cities for Progressive Transmission over Networks
Interactive network-based navigation over large urban environments raises difficult problems due to the size and complexity of these scenes. In this paper, we present a clientser...
Jérôme Royan, R. Balter, Christian Bo...
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
15 years 3 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
ICMCS
2006
IEEE
127views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Effective Error Concealment Algorithm by Boundary Information for H.264 Video Decoder
H.264 is a new video coding standard which contains some novel coding functions and provides more coding efficiency than previous standards. However, video streams are sensitive t...
Guang-Tung Jian, Mei-Juan Chen, Ming-Chieh Chi