Sciweavers

5752 search results - page 271 / 1151
» Informative Labeling Schemes
Sort
View
ITNG
2007
IEEE
15 years 10 months ago
THIS: THreshold security for Information aggregation in Sensor networks
Message aggregation can be used to reduce the communication overhead in a network where many messages have the “same” content. However, it may make the network less secure bec...
Hai Vu, Neeraj Mittal, Subbarayan Venkatesan
SIBGRAPI
2007
IEEE
15 years 10 months ago
Two-stage Binary Image Operator Design: an Approach Based on Interaction Information
We address the problem of binary image operator design over large windows by breaking it into two phases. Firstly, we design several operators over small sub-windows of the main w...
Carlos S. Santos, Nina S. T. Hirata, Roberto Hirat...
AC
1997
Springer
15 years 8 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
BMVC
2001
15 years 6 months ago
Hierarchical Combination of Object Models using Mutual Information
Combining different and complementary object models promises to increase the robustness and generality of today’s computer vision algorithms. This paper introduces a new method ...
Hannes Kruppa, Bernt Schiele
148
Voted
SISW
2005
IEEE
15 years 9 months ago
Lazy Revocation in Cryptographic File Systems
A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data sharing. We consider efficient key management s...
Michael Backes, Christian Cachin, Alina Oprea