Sciweavers

754 search results - page 35 / 151
» Generation of Signatures by Deformations
Sort
View
CCS
2009
ACM
14 years 3 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
ICIP
2003
IEEE
14 years 10 months ago
Color histogram equalization through mesh deformation
In this paper we propose an extension of grayscale histogram equalization for color images. For aesthetic reasons, previously proposed color histogram equalization techniques do n...
Eric Pichon, Marc Niethammer, Guillermo Sapiro
FOCS
2007
IEEE
14 years 3 months ago
Lower Bounds on Signatures From Symmetric Primitives
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most 2(1+o(1))q , where q is the total number of oracle queries a...
Boaz Barak, Mohammad Mahmoody-Ghidary
TACAS
2010
Springer
245views Algorithms» more  TACAS 2010»
14 years 3 months ago
Stranger: An Automata-Based String Analysis Tool for PHP
STRANGER is an automata-based string analysis tool for finding and eliminating string-related security vulnerabilities in PHP applications. STRANGER uses symbolic forward and back...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
EUROCRYPT
1997
Springer
14 years 25 days ago
A New Public-Key Cryptosystem
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying the public-keys indexed by the message bits and the cleartext is recovered by fac...
David Naccache, Jacques Stern