Sciweavers

222 search results - page 10 / 45
» How to Forget a Secret
Sort
View
ACSAC
2006
IEEE
15 years 4 months ago
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we mean that it is suspected to be infected with spywar...
Dinei A. F. Florêncio, Cormac Herley
CVPR
2010
IEEE
15 years 3 months ago
Secrets of Optical Flow Estimation and Their Principles
The accuracy of optical flow estimation algorithms has been improving steadily as evidenced by results on the Middlebury optical flow benchmark. The typical formulation, however...
Deqing Sun, Stefan Roth, Michael Black
ASIACRYPT
2004
Springer
15 years 3 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
CGA
2006
14 years 10 months ago
Secrets to Success and Fatal Flaws: The Design of Large-Display Groupware
Large displays are becoming increasingly common technologies in the workplace because of their potential as information displays and collaboration surfaces. Despite its growing ub...
Elaine M. Huang, Elizabeth D. Mynatt, Daniel M. Ru...
FSE
2000
Springer
91views Cryptology» more  FSE 2000»
15 years 1 months ago
A Statistical Attack on RC6
This paper details the attack on RC6 which was announced in a report published in the proceedings of the second AES candidate conference (March 1999). Based on an observation on th...
Henri Gilbert, Helena Handschuh, Antoine Joux, Ser...