Sciweavers

120 search results - page 6 / 24
» Data Hiding: Current Status and Key Issues
Sort
View
120
Voted
ACSAC
1998
IEEE
15 years 8 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
131
Voted
EDBTW
2010
Springer
15 years 10 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
118
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
138
Voted
SC
2009
ACM
15 years 10 months ago
Terascale data organization for discovering multivariate climatic trends
Current visualization tools lack the ability to perform fullrange spatial and temporal analysis on terascale scientific datasets. Two key reasons exist for this shortcoming: I/O ...
Wesley Kendall, Markus Glatter, Jian Huang, Tom Pe...
126
Voted
ICWSM
2010
15 years 5 months ago
Social Intellisense: A Task-Embedded Interface to Folksonomies
We present an application for accessing and creating socially constructed sets of information. Users store and retrieve information, such as bits of text, through the use of "...
Scott Counts, Kristie Fisher, Aaron Hoff