Sciweavers

18374 search results - page 3587 / 3675
» Applications for data hiding
Sort
View
SOUPS
2010
ACM
14 years 28 days ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
GRAPHITE
2007
ACM
14 years 28 days ago
Appearance preserving octree-textures
Because of their geometric complexity, high resolution 3D models, either designed in high-end modeling packages or acquired with range scanning devices, cannot be directly used in...
Julien Lacoste, Tamy Boubekeur, Bruno Jobard, Chri...
ICEGOV
2007
ACM
14 years 27 days ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
AIPR
2004
IEEE
14 years 24 days ago
Feasibility Study for the Development of a Motion Imagery Quality Metric
The motion imagery community would benefit from the availability of standard measures for assessing image interpretability. The National Imagery Interpretability Rating Scale (NII...
John M. Irvine, Charles Fenimore, David M. Cannon,...
ASIACRYPT
2006
Springer
14 years 24 days ago
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Abstract. Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fa...
Souradyuti Paul, Bart Preneel
« Prev « First page 3587 / 3675 Last » Next »