Sciweavers

362 search results - page 44 / 73
» Extending the Resynchronization Attack
Sort
View
CVPR
2005
IEEE
14 years 10 months ago
Energy Minimization via Graph Cuts: Settling What is Possible
The recent explosion of interest in graph cut methods in computer vision naturally spawns the question: what energy functions can be minimized via graph cuts? This question was fi...
Daniel Freedman, Petros Drineas
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 8 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
FC
2009
Springer
93views Cryptology» more  FC 2009»
14 years 3 months ago
Coercion Resistant End-to-end Voting
End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been consi...
Ryan W. Gardner, Sujata Garera, Aviel D. Rubin
IFIP
2009
Springer
14 years 3 months ago
Towards a Type System for Security APIs
Security API analysis typically only considers a subset of an API’s functions, with results bounded by the number of function calls. Furthermore, attacks involving partial leakag...
Gavin Keighren, David Aspinall, Graham Steel
ICMCS
2008
IEEE
174views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Blind motion-compensated video watermarking
The temporal correlation between adjacent video frames poses a severe challenges for video watermarking applications. Motioncoherent watermarking has been recognized as a strategy...
Peter Meerwald, Andreas Uhl