Sciweavers

679 search results - page 129 / 136
» Using decision problems in public key cryptography
Sort
View
98
Voted
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
15 years 4 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
GI
2003
Springer
15 years 4 months ago
Strategic Simulation Games to foster Policy Development for Critical Infrastructure Protection
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...
Matthias Holenstein, Daniel Bircher
ETVC
2008
15 years 1 months ago
Sparse Multiscale Patches for Image Processing
Abstract. This paper presents a framework to define an objective measure of the similarity (or dissimilarity) between two images for image processing. The problem is twofold: 1) de...
Paolo Piro, Sandrine Anthoine, Eric Debreuve, Mich...
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 11 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
PAMI
2006
187views more  PAMI 2006»
14 years 11 months ago
An Experimental Study on Pedestrian Classification
Detecting people in images is key for several important application domains in computer vision. This paper presents an in-depth experimental study on pedestrian classification; mul...
Stefan Munder, Dariu M. Gavrila