Sciweavers

650 search results - page 72 / 130
» Distorting symmetric designs
Sort
View
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
14 years 2 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner
STORAGESS
2005
ACM
14 years 2 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
ISW
2005
Springer
14 years 2 months ago
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
This paper is primarily concerned with the CBC block cipher mode. The impact on the usability of this mode of recently proposed padding oracle attacks, together with other related ...
Chris J. Mitchell
PCM
2005
Springer
117views Multimedia» more  PCM 2005»
14 years 2 months ago
A Robust Text Segmentation Approach in Complex Background Based on Multiple Constraints
In this paper we propose a robust text segmentation method in complex background. The proposed method first utilizes the K-means algorithm to decompose a detected text block into ...
Libo Fu, Weiqiang Wang, Yaowen Zhan
DRM
2004
Springer
14 years 2 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...