Sciweavers

28 search results - page 5 / 6
» Improved Distinguishing Attacks on HC-256
Sort
View
ACISP
2005
Springer
14 years 18 days ago
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
Abstract. Multivariate public-key cryptosystems (sometimes polynomial-based PKC’s or just multivariates) handle polynomials of many variables over relatively small fields instea...
Bo-Yin Yang, Jiun-Ming Chen
CN
2004
129views more  CN 2004»
13 years 7 months ago
Measuring normality in HTTP traffic for anomaly-based intrusion detection
In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in t...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
ICDM
2009
IEEE
259views Data Mining» more  ICDM 2009»
13 years 4 months ago
Topic Modeling for Sequences of Temporal Activities
: Topic Modeling for Sequences of Temporal Activities Zhi-Yong Shen, Ping Luo, Yuhong Xiong, Jun Sun, Yi-Dong Shen HP Laboratories HPL-2010-160 topic modeling, LDA, sequence, temp...
Zhiyong Shen, Ping Luo, Yuhong Xiong, Jun Sun, Yi-...
HICSS
2008
IEEE
163views Biometrics» more  HICSS 2008»
14 years 1 months ago
Building a Test Suite for Web Application Scanners
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
ICC
2007
IEEE
14 years 1 months ago
Constrained Wavelet Tree Quantization for Image Watermarking
This paper investigates the operations of the wavelet tree based quantization and proposes a constrained wavelet tree quantization for image watermarking. The wavelet coefficients ...
Min-Jen Tsai, Chen-Long Lin