Sciweavers

346 search results - page 40 / 70
» The Secret Santa Problem
Sort
View
ESORICS
2009
Springer
14 years 10 months ago
Tracking Information Flow in Dynamic Tree Structures
Abstract. This paper explores the problem of tracking information flow in dynamic tree structures. Motivated by the problem of manipulating the Document Object Model (DOM) trees by...
Alejandro Russo, Andrei Sabelfeld, Andrey Chudnov
SCN
2004
Springer
121views Communications» more  SCN 2004»
14 years 3 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
ACSAC
2000
IEEE
14 years 2 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
ICASSP
2011
IEEE
13 years 1 months ago
Informed secure watermarking using optimal transport
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
Patrick Bas
CVPR
2012
IEEE
12 years 9 days ago
Classifying covert photographs
The advances in image acquisition techniques make recording images never easier and brings a great convenience to our daily life. It raises at the same time the issue of privacy p...
Haitao Lang, Haibin Ling