Sciweavers

1262 search results - page 102 / 253
» Fast Robust Hashing
Sort
View
ICCSA
2005
Springer
15 years 8 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
15 years 4 months ago
Cryptanalysis of LASH
We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7) ....
Ron Steinfeld, Scott Contini, Krystian Matusiewicz...
CVPR
2006
IEEE
16 years 5 months ago
Control Theory and Fast Marching Techniques for Brain Connectivity Mapping
We propose a novel, fast and robust technique for the computation of anatomical connectivity in the brain. Our approach exploits the information provided by Diffusion Tensor Magne...
Emmanuel Prados, Stefano Soatto, Christophe Lengle...
114
Voted
CVPR
2010
IEEE
15 years 11 months ago
Fast Image Alignment in the Fourier Domain
In this paper we propose a framework for gradient descent image alignment in the Fourier domain. Specifically, we propose an extension to the classical Lucas & Kanade (LK) a...
Ahmed Ashraf, Simon Lucey, Tsuhan Chen
DIM
2005
ACM
15 years 5 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...