Sciweavers

6137 search results - page 1133 / 1228
» Securing Collaborative Applications
Sort
View
ICN
2005
Springer
14 years 2 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...
INDOCRYPT
2005
Springer
14 years 2 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
IPOM
2005
Springer
14 years 2 months ago
Discovering Topologies at Router Level
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Donato Emma, Antonio Pescapè, Giorgio Ventr...
ISVC
2005
Springer
14 years 2 months ago
Investigating the Impact of Face Categorization on Recognition Performance
Face recognition is a key biometric technology with a wide range of potential applications both in government and private sectors. Despite considerable progress in face recognition...
Konstantinos Veropoulos, George Bebis, Michael A. ...
MDAI
2005
Springer
14 years 2 months ago
Noise-Robust Watermarking for Numerical Datasets
Watermarking has been used on multimedia for a variety of applications, among which intellectual property protection stands out. However, and in spite of a growing need, very few a...
Francesc Sebé, Josep Domingo-Ferrer, Agusti...
« Prev « First page 1133 / 1228 Last » Next »