Sciweavers

2478 search results - page 423 / 496
» Message from the Chair
Sort
View
140
Voted
CISS
2010
IEEE
14 years 7 months ago
On Gaussian MIMO compound wiretap channels
— We study the two-user one-eavesdropper discrete memoryless compound wiretap channel, where the transmitter sends a common confidential message to both users, which needs to be...
Ersen Ekrem, Sennur Ulukus
169
Voted
FSE
2011
Springer
263views Cryptology» more  FSE 2011»
14 years 7 months ago
Practical Near-Collisions on the Compression Function of BMW
Abstract. Blue Midnight Wish (BMW) is one of the fastest SHA-3 candidates in the second round of the competition. In this paper we study the compression function of BMW and we obta...
Gaëtan Leurent, Søren S. Thomsen
147
Voted
SDM
2011
SIAM
198views Data Mining» more  SDM 2011»
14 years 6 months ago
Exemplar-based Robust Coherent Biclustering
The biclustering, co-clustering, or subspace clustering problem involves simultaneously grouping the rows and columns of a data matrix to uncover biclusters or sub-matrices of the...
Kewei Tu, Xixiu Ouyang, Dingyi Han, Vasant Honavar
130
Voted
ACC
2011
65views more  ACC 2011»
14 years 3 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis
123
Voted
CCS
2011
ACM
14 years 3 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj