Sciweavers

2327 search results - page 190 / 466
» Secure Image Filtering
Sort
View
ACSAC
2002
IEEE
15 years 6 months ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
114
Voted
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 3 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
101
Voted
VIROLOGY
2008
87views more  VIROLOGY 2008»
15 years 1 months ago
OpenDocument and Open XML security (OpenOffice.org and MS Office 2007)
OpenDocument and Open XML are both new open file formats for office documents. OpenDocument is an ISO standard, promoted by OpenOffice.org and Sun StarOffice. Open XML is the new f...
Philippe Lagadec
NSDI
2008
15 years 4 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
ICCV
2009
IEEE
16 years 5 months ago
Scale Invariance and Noise in Natural Images
Natural images are known to have scale invariant statistics. While some eariler studies have reported the kurtosis of marginal bandpass filter response distributions to be constant...
D. Zoran and Y. Weiss