Sciweavers

2016 search results - page 367 / 404
» Some observations on HC-128
Sort
View
CCS
2003
ACM
15 years 5 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
COMPSAC
2002
IEEE
15 years 4 months ago
Dependency Analysis and Visualization as Tools to Prolong System Life
This paper describes our experience using dependency analysis and visualization as a tool to identify intervention points for migrating applications to environments where they can...
Dave McComb, Simon Robe, Simon Hoare, Stew Crawfor...
EUROCRYPT
2001
Springer
15 years 4 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
ICST
2011
IEEE
14 years 3 months ago
An Empirical Study on the Relation between Dependency Neighborhoods and Failures
—Changing source code in large software systems is complex and requires a good understanding of dependencies between software components. Modification to components with little ...
Thomas Zimmermann, Nachiappan Nagappan, Kim Herzig...
CVPR
2009
IEEE
16 years 7 months ago
Learning General Optical Flow Subspaces for Egomotion Estimation and Detection of Motion Anomalies
This paper deals with estimation of dense optical flow and ego-motion in a generalized imaging system by exploiting probabilistic linear subspace constraints on the flow. We dea...
Richard Roberts (Georgia Institute of Technology),...