Sciweavers

3145 search results - page 32 / 629
» Key Improvements to XTR
Sort
View
FC
2007
Springer
141views Cryptology» more  FC 2007»
15 years 3 months ago
WSKE: Web Server Key Enabled Cookies
In this paper, we present the design and prototype of a new approach to cookie management: if a server deposits a cookie only after authenticating itself via the SSL handshake, the...
Chris Masone, Kwang-Hyun Baek, Sean W. Smith
HICSS
2006
IEEE
165views Biometrics» more  HICSS 2006»
15 years 3 months ago
Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast
Secure multicast has a variety of applications in ecommerce, e-banking, command and control, video-ondemand, and other internet-based services. In this paper, we present algorithm...
Mohammad Hossain Heydari, Linda Morales, Ivan Hal ...
SCALESPACE
2001
Springer
15 years 2 months ago
Morphological Tools for Robust Key-Region Extraction and Video Shot Modeling
Abstract. In recent years, the use of multimedia content has experienced an exponential growth. In this context, the need of new image/video sequence representation is becoming a n...
Javier Ruiz Hidalgo, Philippe Salembier
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Related-Key Impossible Differential Attacks on 8-Round AES-192
In this paper we examine the strength of AES against the related-key impossible differential attack, following the work of Jakimoski and Desmedt [12]. We use several additional obs...
Eli Biham, Orr Dunkelman, Nathan Keller
ECAI
2006
Springer
15 years 1 months ago
Disambiguating Personal Names on the Web Using Automatically Extracted Key Phrases
Abstract. When you search for information regarding a particular person on the web, a search engine returns many pages. Some of these pages may be for people with the same name. Ho...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...