Sciweavers

18 search results - page 4 / 4
» Weaknesses in the SL2(IFs2) Hashing Scheme
Sort
View
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
15 years 6 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...
110
Voted
WWW
2005
ACM
16 years 18 days ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
124
Voted
ICC
2007
IEEE
214views Communications» more  ICC 2007»
15 years 6 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther