We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Hierarchical systems have been widely used to provide scalable distributed services in the Internet. Unfortunately, such a service hierarchy is vulnerable to DoS attacks. This pap...
Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zh...
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 216 +1, and when the classical exponent randomization is used. This attack works ...
Temperature and radiation tolerant electronics, as well as long life survivability are key capabilities required for future NASA missions. Current approaches to electronics for ex...
Adrian Stoica, Didier Keymeulen, Tughrul Arslan, V...
This paper presents an approach to face alignment under variable illumination, an obstacle largely ignored in previous 2D alignment work. To account for illumination variation, ou...
Yuchi Huang, Stephen Lin, Stan Z. Li, Hanqing Lu, ...