Sciweavers

371 search results - page 15 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
123
Voted
CIVR
2008
Springer
220views Image Analysis» more  CIVR 2008»
14 years 11 months ago
Web-based information content and its application to concept-based video retrieval
Semantic similarity between words or phrases is frequently used to find matching correlations between search queries and documents when straightforward matching of terms fails. Th...
Alexander Haubold, Apostol Natsev
87
Voted
TIT
2010
121views Education» more  TIT 2010»
14 years 4 months ago
Power of a public random permutation and its application to authenticated encryption
In this paper, we first show that many independent pseudorandom permutations over {0, 1}n can be obtained from a single public random permutation and secret n bits. We next prove ...
Kaoru Kurosawa
SPIESR
1997
143views Database» more  SPIESR 1997»
14 years 11 months ago
Similarity Evaluation in Image Retrieval Using Simple Features
The development of increasingly complex multimedia applications calls for new methodologies for the organization and retrieval of still images and video sequences. Query and retri...
Eugenio Di Sciascio, Augusto Celentano
USENIX
2001
14 years 11 months ago
Sandboxing Applications
Users frequently have to choose between functionality and security. When running popular Web browsers or email clients, they frequently find themselves turning off features such a...
Vassilis Prevelakis, Diomidis Spinellis
SP
2009
IEEE
15 years 4 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel