Sciweavers

1843 search results - page 82 / 369
» Securing Class Initialization
Sort
View
102
Voted
MVA
2007
150views Computer Vision» more  MVA 2007»
15 years 4 months ago
Detecting the Degree of Anomal in Security Video
We have developed a method that can discriminate anomalous image sequences for more efficiently utilizing security videos. To match the wide popularity of security cameras, the me...
Kyoko Sudo, Tatsuya Osawa, Xiaojun Wu, Kaoru Wakab...
ADHOCNOW
2009
Springer
15 years 3 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
141
Voted
IEICET
2011
14 years 9 months ago
The Security of Abreast-DM in the Ideal Cipher Model
Abstract. In this paper, we give a security proof for Abreast-DM in terms of collision resistance and preimage resistance. As old as Tandem-DM, the compression function Abreast-DM ...
Jooyoung Lee, Daesung Kwon
118
Voted
CSFW
2005
IEEE
15 years 8 months ago
Deciding Knowledge in Security Protocols under (Many More) Equational Theories
In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue ...
Martín Abadi, Véronique Cortier
OTM
2004
Springer
15 years 8 months ago
Design a High-Level Language for Large Network Security Management
A common breach of network security is the class of attacks called Worm-virus. This paper proposes a language called Triton whose goal is to efficiently and effectively safeguard ...
Jangha Kim, Byungwook Song, Kanghee Lee, Sangwook ...