Sciweavers

6164 search results - page 848 / 1233
» Teaching Computer Security
Sort
View
POLICY
2007
Springer
15 years 11 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
115
Voted
DATE
2006
IEEE
127views Hardware» more  DATE 2006»
15 years 11 months ago
Software implementation of Tate pairing over GF(2m)
Recently, the interest about the Tate pairing over binary fields has decreased due to the existence of efficient attacks to the discrete logarithm problem in the subgroups of su...
Guido Bertoni, Luca Breveglieri, Pasqualina Fragne...
IROS
2006
IEEE
84views Robotics» more  IROS 2006»
15 years 11 months ago
Vehicle Trajectory from an Uncalibrated Stereo-Rig with Super-Homography
— We present in this article an original manner to estimate the trajectory of a vehicle running in urban-like areas. The method consists in extracting then tracking features (poi...
Nicolas Simond, Claude Laurgeau
179
Voted
ISDA
2006
IEEE
15 years 11 months ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu
P2P
2006
IEEE
15 years 11 months ago
Route Fingerprinting in Anonymous Communications
Peer discovery and route set-up are an integral part of the processes by which anonymizing peer-to-peer systems are made secure. When systems are large, and individual nodes only ...
George Danezis, Richard Clayton