Sciweavers

14824 search results - page 2906 / 2965
» Security - Introduction
Sort
View
FSE
2008
Springer
143views Cryptology» more  FSE 2008»
15 years 16 days ago
Algebraic and Slide Attacks on KeeLoq
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc...
Nicolas Courtois, Gregory V. Bard, David Wagner
BIOSIG
2008
170views Biometrics» more  BIOSIG 2008»
15 years 13 days ago
Frontex Perspectives on Biometrics for Border Checks
: The European Union is developing new concepts for border management. Biometrics is seen is a key technology to facilitate more secure and convenient border management. Biometric ...
Erik Berglund, Rasa Karbauskaite
DAGSTUHL
2010
15 years 13 days ago
Visual Simulation of Flow
We have adopted a numerical method from computational fluid dynamics, the Lattice Boltzmann Method (LBM), for real-time simulation and visualization of flow and amorphous phenomen...
Arie E. Kaufman, Ye Zhao
DBSEC
2010
101views Database» more  DBSEC 2010»
15 years 13 days ago
Generalizing PIR for Practical Private Retrieval of Public Data
Private retrieval of public data is useful when a client wants to query a public data service without revealing the specific query data to the server. Computational Private Informa...
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
DGO
2007
174views Education» more  DGO 2007»
15 years 13 days ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá
« Prev « First page 2906 / 2965 Last » Next »