Sciweavers

15379 search results - page 276 / 3076
» Protecting users from
Sort
View
ISCAS
2008
IEEE
127views Hardware» more  ISCAS 2008»
14 years 2 months ago
Compact ASIC implementation of the ICEBERG block cipher with concurrent error detection
— ICEBERG is a block cipher that has been recently proposed for security applications requiring efficient FPGA implementations. In this paper, we investigate a compact ASIC imple...
Huiju Cheng, Howard M. Heys
IBPRIA
2007
Springer
14 years 2 months ago
Computer Vision Approaches to Pedestrian Detection: Visible Spectrum Survey
Pedestrian detection from images of the visible spectrum is a high relevant area of research given its potential impact in the design of pedestrian protection systems. There are ma...
David Gerónimo, Antonio M. López, An...
OTM
2007
Springer
14 years 2 months ago
Self-healing in Binomial Graph Networks
The number of processors embedded in high performance computing platforms is growing daily to solve larger and more complex problems. However, as the number of components increases...
Thara Angskun, George Bosilca, Jack Dongarra
NDSS
1998
IEEE
14 years 16 days ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
EDBT
2010
ACM
180views Database» more  EDBT 2010»
14 years 9 days ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...