Sciweavers

20175 search results - page 4 / 4035
» Is abstraction the key to computing
Sort
View
ICPR
2002
IEEE
16 years 1 months ago
Visual Abstraction of Wildlife Footage Using Gaussian Mixture Models and the Minimum Description Length Criterion
bstraction of Wildlife Footage using Gaussian Mixture Models and the Minimum Description Length Criterion David Gibson Neill Campbell Barry Thomas Department of Computer Science Un...
David P. Gibson, Neill W. Campbell, Barry T. Thoma...
ESORICS
2006
Springer
15 years 4 months ago
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Abstract We present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which we consider authentication and key secrecy properties. Our ...
Michael Backes, Iliano Cervesato, Aaron D. Jaggard...
64
Voted
IMA
2001
Springer
78views Cryptology» more  IMA 2001»
15 years 4 months ago
Unconditionally Secure Key Agreement Protocol
Abstract. The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility un...
Cyril Prissette
IH
2009
Springer
15 years 7 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
90
Voted
ASIACRYPT
2007
Springer
15 years 6 months ago
Symmetric Key Cryptography on Modern Graphics Hardware
Abstract. GPUs offer a tremendous amount of computational bandwidth that was until now largely unusable for cryptographic computations due to a lack of integer arithmetic and user...
Jason Yang, James Goodman