Sciweavers

74 search results - page 10 / 15
» Fully Leakage-Resilient Signatures
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
ICIP
2004
IEEE
15 years 11 months ago
Progressive protection of jpeg2000 codestreams
This paper presents an authentication scheme and an access control scheme for JPEG2000 image codestreams based on hash chains. Both schemes are fully compatible with the core part...
Yongdong Wu, Di Ma, Robert H. Deng
ENTCS
2008
99views more  ENTCS 2008»
14 years 10 months ago
A Categorical Model of the Fusion Calculus
We provide a categorical presentation of the Fusion calculus. Working in a suitable category of presheaves, we describe the syntax as initial algebra of a signature endofunctor, a...
Marino Miculan
CN
2007
124views more  CN 2007»
14 years 9 months ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
IGARSS
2009
14 years 7 months ago
Parallel Implementation of Endmember Extraction Algorithms using NVidia Graphical Processing Units
Spectral mixture analysis is an important task for remotely sensed hyperspectral data interpretation. In spectral unmixing, both the determination of spectrally pure signatures (e...
Antonio Plaza, Javier Plaza, Sergio Sánchez