Sciweavers

859 search results - page 61 / 172
» The Changing Face of Cryptography
Sort
View
3DPVT
2006
IEEE
169views Visualization» more  3DPVT 2006»
13 years 11 months ago
Qualitative Characterization of Deforming Surfaces
This paper extends the idea of classification schemes for static surface curvature into the temporal domain. We seek to identify regions in sequences of depth data that exhibit va...
T. C. Lukins, R. B. Fisher
CGF
2011
12 years 11 months ago
Computer-Suggested Facial Makeup
Finding the best makeup for a given human face is an art in its own right. Experienced makeup artists train for years to be skilled enough to propose a best-fit makeup for an ind...
Kristina Scherbaum, Tobias Ritschel, Matthias B. H...
ICDE
2007
IEEE
151views Database» more  ICDE 2007»
14 years 9 months ago
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of encryption have been proposed to deal with this proble...
Tingjian Ge, Stanley B. Zdonik
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
14 years 1 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
CCS
2011
ACM
12 years 7 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...