Sciweavers

ACISP
2015
Springer
10 years 12 days ago
Bad Directions in Cryptographic Hash Functions
A 25-gigabyte “point obfuscation” challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation” is another name for passwor...
Daniel J. Bernstein, Andreas Hülsing, Tanja L...
ACISP
2015
Springer
10 years 12 days ago
Towards Forward Security Properties for PEKS and IBE
In cryptography, forward secrecy is a well-known property for key agreement protocols. It ensures that a session key will remain private even if one of the long-term secret keys is...
Qiang Tang 0001
ACISP
2015
Springer
10 years 12 days ago
VisRAID: Visualizing Remote Access for Intrusion Detection
Detecting malicious attempts to access computers is difficult with current security applications. Many current applications do not give the user the right information to find and ...
Leliel Trethowen, Craig Anslow, Stuart Marshall, I...
ACISP
2015
Springer
10 years 12 days ago
Constant Size Ring Signature Without Random Oracle
Ring signature enables an user to anonymously sign a message on behalf of a group of users termed as ‘ring’ formed in an ‘ad-hoc’ manner. A naive scheme produces a signatur...
Priyanka Bose, Dipanjan Das 0002, Chandrasekaran P...
ACISICIS
2015
IEEE
10 years 12 days ago
Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment
— Cloud computing is the emerging field nowadays and it has truly revolutionized the domain of Information Technology. This domain is very large and not easy to handle especially...
Muhammad Irfan, Haider Abbas, Waseem Iqbal
ACISICIS
2015
IEEE
10 years 12 days ago
Nearest multi-prototype based music mood classification
—Music mood classification is a crucial component in the field of multimedia database retrieval and computational musicology. There is a constantly growing interest in developing...
Babu Kaji Baniya, Choong Seon Hong, Joonwhoan Lee
ACISICIS
2015
IEEE
10 years 12 days ago
Multi-purpose Adaptable Business Tier Components based on Call Level Interfaces
Call Level Interfaces (CLI) are low level API that play a key role in database applications whenever a fine tune control between application tiers and the host databases is a key ...
Óscar Mortágua Pereira, Rui L. Aguia...
ACISICIS
2015
IEEE
10 years 12 days ago
Using Ant's Colony Algorithm for improved segmentation for number plate recognition
— In this paper a number plate recognition system has been designed using the ant colony optimization technique. This system can be implemented in surveillance systems, detection...
Sanchay Dewan, Shreyansh Bajaj, Shantanu Prakash
ACIIDS
2015
IEEE
8views Database» more  ACIIDS 2015»
10 years 12 days ago
A Method for Merging Similar Zones to Improve Intelligent Models for Real Estate Appraisal
A method for property valuation based on the concept of merging different areas of the city into uniform zones reflecting the characteristics of the real estate market was worked o...
Tadeusz Lasota, Edward Sawilow, Bogdan Trawinski, ...
ACIIDS
2015
IEEE
12views Database» more  ACIIDS 2015»
10 years 12 days ago
Truck Loading Schedule Optimization Using Genetic Algorithm for Yard Management
A new information system for order and yard management was implemented and deployed in a timber products company. The system was equipped with an innovative mechanism which automat...
Tadeusz Cekala, Zbigniew Telec, Bogdan Trawinski