Sciweavers

923 search results - page 107 / 185
» Improved Slide Attacks
Sort
View
JUCS
2010
124views more  JUCS 2010»
15 years 2 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
123
Voted
CIARP
2007
Springer
15 years 10 months ago
A Method for Estimating Authentication Performance over Time, with Applications to Face Biometrics
Underlying biometrics are biological tissues that evolve over time. Hence, biometric authentication (and recognition in general) is a dynamic pattern recognition problem. We propos...
Norman Poh, Josef Kittler, Raymond S. Smith, Jose ...
ICIP
2000
IEEE
16 years 5 months ago
A New Spread Spectrum Watermarking Method with Self-Synchronization Capabilities
Among the many techniques available for informationconcealment, those based on spread spectrummodulationshave proven to yield improved results when robustness against attack is at...
Angel Navia-Vázquez, I. Mora-Jiménez
USENIX
2007
15 years 6 months ago
From STEM to SEAD: Speculative Execution for Automated Defense
Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...
IFIP
2009
Springer
15 years 10 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi