Sciweavers

2055 search results - page 382 / 411
» Generic Model Refactorings
Sort
View
EUROCRYPT
1999
Springer
15 years 2 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
PDP
2010
IEEE
15 years 1 months ago
Malleable-Lab: A Tool for Evaluating Adaptive Online Schedulers on Malleable Jobs
—The emergence of multi-core computers has led to explosive development of parallel applications and hence the need of efficient schedulers for parallel jobs. Adaptive online sc...
Yangjie Cao, Hongyang Sun, Wen-Jing Hsu, Depei Qia...
ASIACRYPT
2008
Springer
14 years 12 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
CIVR
2008
Springer
207views Image Analysis» more  CIVR 2008»
14 years 11 months ago
Accumulated motion energy fields estimation and representation for semantic event detection
In this paper, a motion-based approach for detecting highlevel semantic events in video sequences is presented. Its main characteristic is its generic nature, i.e. it can be direc...
Georgios Th. Papadopoulos, Vasileios Mezaris, Ioan...
DIMVA
2010
14 years 11 months ago
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
Abstract. Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Alt...
Antonio Nappa, Aristide Fattori, Marco Balduzzi, M...