Sciweavers

360 search results - page 17 / 72
» ccs 2008
Sort
View
3DOR
2008
15 years 16 days ago
Characterizing Shape Using Conformal Factors
We present a new 3D shape descriptor based on conformal geometry. Our descriptor is invariant under non-rigid quasi-isometric transformations, such as pose changes of articulated ...
Mirela Ben-Chen, Craig Gotsman
CCS
2009
ACM
15 years 4 months ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...
CCS
2008
ACM
15 years 3 days ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
CCS
2008
ACM
15 years 3 days ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
CCS
2008
ACM
15 years 3 days ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...