Sciweavers

1795 search results - page 154 / 359
» Security Models and Information Flow
Sort
View
ALGORITHMICA
2002
104views more  ALGORITHMICA 2002»
15 years 3 months ago
Security of Quantum Key Distribution against All Collective Attacks
Security of quantum key distribution against sophisticated attacks is among the most important issues in quantum information theory. In this work we prove security against a very ...
Eli Biham, Michel Boyer, Gilles Brassard, Jeroen v...
ECCV
2002
Springer
16 years 5 months ago
Automatic Detection and Tracking of Human Motion with a View-Based Representation
Abstract. This paper proposes a solution for the automatic detection and tracking of human motion in image sequences. Due to the complexity of the human body and its motion, automa...
Ronan Fablet, Michael J. Black
CRYPTO
1989
Springer
163views Cryptology» more  CRYPTO 1989»
15 years 8 months ago
Undeniable Signatures
Abstract. In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure undeniable signatures so that the existing algo...
David Chaum, Hans Van Antwerpen
138
Voted
COMPSEC
2004
115views more  COMPSEC 2004»
15 years 3 months ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart
ICC
2007
IEEE
104views Communications» more  ICC 2007»
15 years 10 months ago
Secure Tracking in Sensor Networks
Abstract— Target tracking is a canonical issue in sensor networks research. However, tracking security has gained little or no attention. Once a sensor node is compromised, it wi...
Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wa...