Sciweavers

404 search results - page 59 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
JDCTA
2010
250views more  JDCTA 2010»
14 years 10 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
FC
2010
Springer
169views Cryptology» more  FC 2010»
15 years 6 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
116
Voted
CIVR
2004
Springer
121views Image Analysis» more  CIVR 2004»
15 years 8 months ago
Assessing Scene Structuring in Consumer Videos
Abstract. Scene structuring is a video analysis task for which no common evaluation procedures have been fully adopted. In this paper, we present a methodology to evaluate such tas...
Daniel Gatica-Perez, Napat Triroj, Jean-Marc Odobe...
BMCBI
2010
163views more  BMCBI 2010»
15 years 3 months ago
Reduced representation of protein structure: implications on efficiency and scope of detection of structural similarity
Background: Computational comparison of two protein structures is the starting point of many methods that build on existing knowledge, such as structure modeling (including modeli...
Zong Hong Zhang, Hwee Kuan Lee, Ivana Mihalek
ISI
2006
Springer
15 years 3 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara