Sciweavers

859 search results - page 113 / 172
» The Changing Face of Cryptography
Sort
View
RAID
2010
Springer
14 years 9 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
ACCV
2010
Springer
14 years 7 months ago
3D Object Recognition Based on Canonical Angles between Shape Subspaces
We propose a method to measure similarity of shape for 3D objects using 3-dimensional shape subspaces produced by the factorization method. We establish an index of shape similarit...
Yosuke Igarashi, Kazuhiro Fukui
COMSUR
2011
221views Hardware» more  COMSUR 2011»
13 years 11 months ago
Computational Intelligence in Wireless Sensor Networks: A Survey
—Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many chall...
Raghavendra V. Kulkarni, A. Forster, Ganesh K. Ven...
ICSE
2008
IEEE-ACM
15 years 12 months ago
The international workshop on software architectures and mobility (SAM 2008)
E-businesses are increasingly facing the need of porting the provision of their e-services to mobile customers. Evolving requirements, such as reliability, security, scalability, ...
Licia Capra, Rami Bahsoon, Wolfgang Emmerich, Moha...
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
16 years 12 days ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra