Sciweavers

915 search results - page 103 / 183
» Proof labeling schemes
Sort
View
AHS
2006
IEEE
188views Hardware» more  AHS 2006»
13 years 12 months ago
Finite State Machine IP Watermarking: A Tutorial
Sharing Intellectual Property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
CIARP
2006
Springer
13 years 11 months ago
A New Approach to Multi-class Linear Dimensionality Reduction
Linear dimensionality reduction (LDR) is quite important in pattern recognition due to its efficiency and low computational complexity. In this paper, we extend the two-class Chern...
Luis Rueda, Myriam Herrera
ICISC
2007
95views Cryptology» more  ICISC 2007»
13 years 9 months ago
Security-Preserving Asymmetric Protocol Encapsulation
Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different ro...
Raphael C.-W. Phan, Serge Vaudenay
ICISC
2007
125views Cryptology» more  ICISC 2007»
13 years 9 months ago
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
In the 80’s Matsumoto and Imai [8] proposed public key cryptosystems based on the difficulty of solving systems of polynomials in several variables. Although these first schemes...
Antoine Scemama
IJCAI
2003
13 years 9 months ago
A Tractability Result for Reasoning with Incomplete First-Order Knowledge Bases
In previous work, Levesque proposed an extension to classical databases that would allow for a certain form of incomplete first-order knowledge. Since this extension was suffici...
Yongmei Liu, Hector J. Levesque