Sciweavers

648 search results - page 51 / 130
» Authenticated hash tables
Sort
View
VC
2008
99views more  VC 2008»
13 years 9 months ago
Minimizing probable collision pairs searched in interactive animation authoring
Animation authoring involves an author's interaction with a scene, resulting in varying scene complexity for a given animation sequence. In such a varying environment, detecti...
Parag Agarwal, Srinivas Rajagopalan, B. Prabhakara...
DEBS
2010
ACM
13 years 4 months ago
Distributed structural and value XML filtering
Many XML filtering systems have emerged in recent years identifying XML data that structurally match XPath queries in an efficient way. However, apart from structural matching, it...
Iris Miliaraki, Manolis Koubarakis
JIKM
2011
101views more  JIKM 2011»
13 years 25 days ago
Automated Generation of Personal Data Reports from Relational Databases
Abstract. This paper presents a novel approach for extracting personal data and automatically generating Personal Data Reports (PDRs) from relational databases. Such PDRs can be us...
Georgios John Fakas, Ben Cawley, Zhi Cai
ICIP
2004
IEEE
14 years 11 months ago
Robust perceptual image hashing using feature points
Perceptual image hashing maps an image to a fixed length binary string based on the image's appearance to the human eye, and has applications in image indexing, authenticatio...
Vishal Monga, Brian L. Evans
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
13 years 11 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel