Sciweavers

2648 search results - page 39 / 530
» Human Factors In Computer Security
Sort
View
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 5 days ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai
ICALP
2005
Springer
15 years 3 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
CVPR
2011
IEEE
14 years 5 months ago
Simulating Human Saccadic Scanpaths on Natural Images
Human saccade is a dynamic process of information pursuit. Based on the principle of information maximization, we propose a computational model to simulate human saccadic scanpath...
Wei Wang, Cheng Chen, Yizhou Wang, Tingting Jiang,...
CVPR
2008
IEEE
15 years 11 months ago
Unsupervised estimation of segmentation quality using nonnegative factorization
We propose an unsupervised method for evaluating image segmentation. Common methods are typically based on evaluating smoothness within segments and contrast between them, and the...
Roman Sandler, Michael Lindenbaum