Sciweavers

923 search results - page 130 / 185
» Improved Slide Attacks
Sort
View
ICC
2009
IEEE
246views Communications» more  ICC 2009»
15 years 10 months ago
Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
—The difficulty of processing data in encrypted form has long been the barrier to the widespread use of encryption in data storage applications; improved security or privacy wou...
Aldar Chun-fai Chan
ICCBR
2009
Springer
15 years 10 months ago
Spatial Event Prediction by Combining Value Function Approximation and Case-Based Reasoning
This paper presents a new approach for spatial event prediction that combines a value function approximation algorithm and case-based reasoning predictors. Each of these predictors...
Hua Li, Héctor Muñoz-Avila, Diane Br...
ASIAMS
2008
IEEE
15 years 10 months ago
HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment
Our previous research illustrated the design of fuzzy logic based online risk assessment for Distributed Intrusion Prediction and Prevention Systems (DIPPS) [3]. Based on the DIPP...
Kjetil Haslum, Ajith Abraham, Svein J. Knapskog
CSSE
2008
IEEE
15 years 10 months ago
Embedding in Two Least Significant Bits with Wet Paper Coding
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are in...
Xin Liao, Qiao-Yan Wen
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
15 years 10 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri