Sciweavers

5722 search results - page 391 / 1145
» Security Function Interactions
Sort
View
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
IJCIS
1998
107views more  IJCIS 1998»
15 years 3 months ago
Supporting Electronic Commerce Transactions with Contracting Services
Abstracting from basic communication mechanisms such as transactionally secure remote procedure calls and remote database access mechanisms, this includes service trading and bro...
Michael Merz, Frank Griffel, M. Tuan Tu, Stefan M&...
ICIP
2002
IEEE
16 years 5 months ago
Optimal recursive similarity measure estimation for interactive content-based image retrieval
In this paper, a new recursive algorithm is proposed for optimal estimation of similarity measure used in a content-based retrieval system. This is performed through a relevance f...
Anastasios D. Doulamis, Nikolaos D. Doulamis
GIS
2004
ACM
16 years 5 months ago
Discovering personal gazetteers: an interactive clustering approach
Personal gazetteers record individuals' most important places, such as home, work, grocery store, etc. Using personal gazetteers in location-aware applications offers additio...
Changqing Zhou, Dan Frankowski, Pamela J. Ludford,...
WWW
2003
ACM
16 years 4 months ago
Using Compact GML to Deploy Interactive Maps on Mobile
As users get connected with new-generation smart programmable phones and Personal Digital Assistants, they look for geographic information and location-aware services. In such a s...
Emanuela De Vita, Andrea Piras, Stefano Sanna