Sciweavers

360 search results - page 21 / 72
» On Protection by Layout Randomization
Sort
View
IJNSEC
2006
131views more  IJNSEC 2006»
14 years 9 months ago
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
The most efficient technique for protecting the using Frobenius algorithms for scalar multiplication on Koblitz curves against the Side Channel Attacks seems to be the multiplier ...
Mustapha Hedabou
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
15 years 6 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
15 years 4 months ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
15 years 3 months ago
W3Bcrypt: Encryption as a Stylesheet
Abstract. While web-based communications (e.g., webmail or web chatrooms) are increasingly protected by transport-layer cryptographic mechanisms, such as the SSL/TLS protocol, ther...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
78
Voted
ICIP
2003
IEEE
15 years 11 months ago
A semantic representation for image retrieval
Robust semantic labeling of image regions is a basic problem in representing and retrieving image/video content. We propose an SVM-MRF framework to model features and their spatia...
Lei Wang, B. S. Manjunath