Sciweavers

4529 search results - page 93 / 906
» Position Based Cryptography
Sort
View
CSFW
2011
IEEE
14 years 4 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
AAAI
2012
13 years 7 months ago
An Object-Based Bayesian Framework for Top-Down Visual Attention
We introduce a new task-independent framework to model top-down overt visual attention based on graphical models for probabilistic inference and reasoning. We describe a Dynamic B...
Ali Borji, Dicky N. Sihite, Laurent Itti
MIAR
2006
IEEE
15 years 11 months ago
A Novel Liver Perfusion Analysis Based on Active Contours and Chamfer Matching
Liver Perfusion gives important information about blood supply of liver. However, in daily clinical diagnosis, radiologists have to manually mark the perfusion position in time-seq...
Gang Chen, Lixu Gu
CHES
2004
Springer
230views Cryptology» more  CHES 2004»
15 years 10 months ago
Correlation Power Analysis with a Leakage Model
Abstract. A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but consta...
Eric Brier, Christophe Clavier, Francis Olivier
CONCUR
2003
Springer
15 years 10 months ago
Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus
We describe a probabilistic polynomial-time process calculus for analyzing cryptographic protocols and use it to derive compositionality properties of protocols in the presence of ...
Paulo Mateus, John C. Mitchell, Andre Scedrov