Sciweavers

3212 search results - page 173 / 643
» Faster Concept Analysis
Sort
View
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 10 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
15 years 10 months ago
A Side-Channel Analysis Resistant Description of the AES S-Box
So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks have been very expensive to implement. In this a...
Elisabeth Oswald, Stefan Mangard, Norbert Pramstal...
ICWE
2004
Springer
15 years 10 months ago
Semantic Analysis of a Web Site: a Prototype
Many works has been made to improve the users browsing on Web sites notably with the adaptation techniques which allow to guide the users according to their profile in order to di...
Michel Sala, Gaël Isoird
HICSS
2003
IEEE
117views Biometrics» more  HICSS 2003»
15 years 9 months ago
Measuring the Degree of Virtualization - An Empirical Analysis in two Austrian Industries
Strategic management literature suggests that especially in young and dynamic industries Virtual Corporations are more likely to emerge, as this type of organization is flexible e...
Roland Bauer, Sabine T. Köszegi, Michaela Wol...
ICMCS
2000
IEEE
142views Multimedia» more  ICMCS 2000»
15 years 9 months ago
Incorporate Discriminant Analysis with EM Algorithm in Image Retrieval
One of the difficulties of Content-Based Image Retrieval (CBIR) is the gap between high-level concepts and low-level image features, e.g., color and texture. Relevance feedback wa...
Qi Tian, Ying Wu, Thomas S. Huang