Sciweavers

634 search results - page 49 / 127
» Groundwork for Weak Analysis
Sort
View
ICDAR
2007
IEEE
15 years 10 months ago
Camera-Based Graphical Symbol Detection
In this paper we present a method to locate and recognize graphical symbols appearing in real images. A vectorial signature is defined to describe graphical symbols. It is formul...
Marçal Rusiñol, Josep Lladós,...
128
Voted
ASWEC
2006
IEEE
15 years 9 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
114
Voted
ARITH
2005
IEEE
15 years 9 months ago
Data Dependent Power Use in Multipliers
Recent research has demonstrated the vulnerability of certain smart card architectures to power and electromagnetic analysis when multiplier operations are insufficiently shielde...
Colin D. Walter, David Samyde
90
Voted
ICDAR
2005
IEEE
15 years 9 months ago
Text Locating Competition Results
This paper describes the results of the ICDAR 2005 competition for locating text in camera captured scenes. For this we used the same data as the ICDAR 2003 competition, which has...
Simon M. Lucas
121
Voted
IDA
2005
Springer
15 years 9 months ago
Exploring Hierarchical Rule Systems in Parallel Coordinates
Rule systems have failed to attract much interest in large data analysis problems because they tend to be too simplistic to be useful or consist of too many rules for human interpr...
Thomas R. Gabriel, A. Simona Pintilie, Michael R. ...