Sciweavers

1843 search results - page 143 / 369
» Securing Class Initialization
Sort
View
JUCS
2008
122views more  JUCS 2008»
15 years 4 months ago
Using an Evolving Thematic Clustering in a Text Segmentation Process
Abstract: The thematic text segmentation task consists in identifying the most important thematic breaks in a document in order to cut it into homogeneous passages. We propose in t...
Sylvain Lamprier, Tassadit Amghar, Bernard Levrat,...
ICIP
2009
IEEE
16 years 6 months ago
Age Regression From Faces Using Random Forests
Predicting the age of a person through face image analysis holds the potential to drive an extensive array of real world applications from human computer interaction and security ...
P2P
2006
IEEE
15 years 11 months ago
Route Fingerprinting in Anonymous Communications
Peer discovery and route set-up are an integral part of the processes by which anonymizing peer-to-peer systems are made secure. When systems are large, and individual nodes only ...
George Danezis, Richard Clayton
162
Voted
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Indistinguishability Amplification
system is the abstraction of the input-output behavior of any kind of discrete system, in particular cryptographic systems. Many aspects of cryptographic security analyses and pro...
Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner
129
Voted
ESORICS
2006
Springer
15 years 8 months ago
Conditional Reactive Simulatability
Abstract. Simulatability has established itself as a salient notion for defining and proving the security of cryptographic protocols since it entails strong security and compositio...
Michael Backes, Markus Dürmuth, Dennis Hofhei...