Sciweavers

16091 search results - page 2990 / 3219
» Solving
Sort
View
ECRIME
2007
15 years 9 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
EMMCVPR
2007
Springer
15 years 9 months ago
An Automatic Portrait System Based on And-Or Graph Representation
Abstract. In this paper, we present an automatic human portrait system based on the And-Or graph representation. The system can automatically generate a set of life-like portraits ...
Feng Min, Jin-Li Suo, Song Chun Zhu, Nong Sang
EMNETS
2007
15 years 9 months ago
Robust node localization for wireless sensor networks
The node localization problem in Wireless Sensor Networks has received considerable attention, driven by the need to obtain a higher location accuracy without incurring a large, p...
Radu Stoleru, John A. Stankovic, Sang Hyuk Son
CSFW
2009
IEEE
15 years 9 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung
COCO
2010
Springer
135views Algorithms» more  COCO 2010»
15 years 9 months ago
Lower Bounds for Testing Function Isomorphism
—We prove new lower bounds in the area of property testing of boolean functions. Specifically, we study the problem of testing whether a boolean function f is isomorphic to a ...
Eric Blais, Ryan O'Donnell
« Prev « First page 2990 / 3219 Last » Next »