Sciweavers

5722 search results - page 546 / 1145
» Security Function Interactions
Sort
View
ICPR
2008
IEEE
16 years 6 months ago
Refining PTZ camera calibration
Due to the increased need for security and surveillance, PTZ cameras are now being widely used in many domains. Therefore, it is very important for the applications like video mos...
Hassan Foroosh, Imran N. Junejo
INDOCRYPT
2009
Springer
15 years 11 months ago
FSBday
This paper applies generalized birthday attacks to the FSB compression function, and shows how to adapt the attacks so that they run in far less memory. In particular, this paper p...
Daniel J. Bernstein, Tanja Lange, Ruben Niederhage...
SAFECOMP
2007
Springer
15 years 11 months ago
Software Encoded Processing: Building Dependable Systems with Commodity Hardware
In future, the decreasing feature size and the reduced power supply will make it much more difficult to built reliable microprocessors. Economic pressure will most likely result in...
Ute Wappler, Christof Fetzer
DASC
2006
IEEE
15 years 11 months ago
Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services
Abstract— This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication perform...
Philip K. McKinley, Farshad A. Samimi, Jonathan K....
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 10 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page