Sciweavers

134 search results - page 21 / 27
» Attack for Flash MIX
Sort
View
IGARSS
2010
13 years 6 months ago
Recent developments in sparse hyperspectral unmixing
This paper explores the applicability of new sparse algorithms to perform spectral unmixing of hyperspectral images using available spectral libraries instead of resorting to well...
Marian-Daniel Iordache, Antonio J. Plaza, Jos&eacu...
AINA
2011
IEEE
13 years 7 days ago
Data Caching for Enhancing Anonymity
—The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employ...
Rajiv Bagai, Bin Tang
FSE
2011
Springer
218views Cryptology» more  FSE 2011»
13 years 2 days ago
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to fou...
Jérémy Jean, Pierre-Alain Fouque
AAAI
2011
12 years 8 months ago
Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty
Attacker-defender Stackelberg games have become a popular game-theoretic approach for security with deployments for LAX Police, the FAMS and the TSA. Unfortunately, most of the ex...
Zhengyu Yin, Manish Jain, Milind Tambe, Fernando O...
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
14 years 3 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar