Sciweavers

763 search results - page 57 / 153
» Digital Signatures Today
Sort
View
ACISP
2007
Springer
14 years 3 months ago
Hash-and-Sign with Weak Hashing Made Secure
Abstract. Digital signatures are often proven to be secure in the random oracle model while hash functions deviate more and more from this idealization. Liskov proposed to model a ...
Sylvain Pasini, Serge Vaudenay
CONEXT
2007
ACM
13 years 11 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
CHI
2002
ACM
14 years 10 months ago
SmartSkip: consumer level browsing and skipping of digital video content
In this paper, we describe an interface for browsing and skipping digital video content in a consumer setting; that is, sitting and watching television from a couch using a standa...
Steven M. Drucker, Asta Glatzer, Steven De Mar, Cu...
ERCIMDL
2004
Springer
112views Education» more  ERCIMDL 2004»
14 years 3 months ago
Content-Based Retrieval in Digital Music Libraries
Abstract. MiDiLiB is a six year research project on digital music libraries funded by the German Research Foundation (DFG) as a part of the Distributed Processing and Delivery of D...
Michael Clausen, Frank Kurth, Meinard Müller,...
ADL
1998
Springer
184views Digital Library» more  ADL 1998»
14 years 1 months ago
Logical Information Modeling of Web-Accessible Heterogeneous Digital Assets
This paper introduces the MREF framework for representing and correlating information at a higher semantic level than is possible with Web-based information systems today. The rol...
Kshitij Shah, Amit P. Sheth