Sciweavers

6861 search results - page 1290 / 1373
» Security for Ubiquitous Computing
Sort
View
MM
2010
ACM
252views Multimedia» more  MM 2010»
13 years 9 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
ICASSP
2010
IEEE
13 years 9 months ago
Improved Internet traffic analysis via optimized sampling
Applications to evaluate Internet quality-of-service and increase network security are essential to maintaining reliability and high performance in computer networks. These applic...
Sean McPherson, Antonio Ortega
CCR
2010
133views more  CCR 2010»
13 years 9 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 9 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta
CORR
2010
Springer
128views Education» more  CORR 2010»
13 years 9 months ago
Random Oracles in a Quantum World
Once quantum computers reach maturity most of today's traditional cryptographic schemes based on RSA or discrete logarithms become vulnerable to quantum-based attacks. Hence, ...
Özgür Dagdelen, Marc Fischlin, Anja Lehm...
« Prev « First page 1290 / 1373 Last » Next »