Sciweavers

679 search results - page 99 / 136
» Using decision problems in public key cryptography
Sort
View
IFIP
2010
Springer
14 years 8 months ago
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems
Abstract. This paper extends existing models for collaborative systems. We investigate how much damage can be done by insiders alone, without collusion with an outside adversary. I...
Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, ...
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 7 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
FSE
2005
Springer
153views Cryptology» more  FSE 2005»
15 years 6 months ago
F-FCSR: Design of a New Class of Stream Ciphers
In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This au...
François Arnault, Thierry P. Berger
ICDM
2010
IEEE
226views Data Mining» more  ICDM 2010»
14 years 11 months ago
Edge Weight Regularization over Multiple Graphs for Similarity Learning
The growth of the web has directly influenced the increase in the availability of relational data. One of the key problems in mining such data is computing the similarity between o...
Pradeep Muthukrishnan, Dragomir R. Radev, Qiaozhu ...
CVPR
2012
IEEE
13 years 3 months ago
Semantic structure from motion with points, regions, and objects
Structure from motion (SFM) aims at jointly recovering the structure of a scene as a collection of 3D points and estimating the camera poses from a number of input images. In this...
Sid Ying-Ze Bao, Mohit Bagra, Yu-Wei Chao, Silvio ...