Sciweavers

247 search results - page 30 / 50
» ccs 2007
Sort
View
CCS
2007
ACM
15 years 1 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
80
Voted
CCS
2007
ACM
15 years 1 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
CCS
2007
ACM
15 years 1 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
CGF
2007
82views more  CGF 2007»
14 years 9 months ago
Unpopping: Solving the Image-Space Blend Problem for Smooth Discrete LOD Transitions
This paper presents a new, simple and practical algorithm to avoid artifacts when switching between discrete levels of detail (LOD) by smoothly blending LOD representations in ima...
Markus Giegl, Michael Wimmer
CGF
2007
126views more  CGF 2007»
14 years 9 months ago
A Bidirectional Light Field - Hologram Transform
In this paper, we propose a novel framework to represent visual information. Extending the notion of conventional image-based rendering, our framework makes joint use of both ligh...
Remo Ziegler, Simon Bucheli, Lukas Ahrenberg, Marc...