Sciweavers

2821 search results - page 122 / 565
» Tracing a single user
Sort
View
CCS
2010
ACM
13 years 10 months ago
Dismantling SecureMemory, CryptoMemory and CryptoRF
The Atmel chip families SecureMemory, CryptoMemory, and CryptoRF use a proprietary stream cipher to guarantee authenticity, confidentiality, and integrity. This paper describes th...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
CORR
2008
Springer
92views Education» more  CORR 2008»
13 years 9 months ago
Convex Sparse Matrix Factorizations
We present a convex formulation of dictionary learning for sparse signal decomposition. Convexity is obtained by replacing the usual explicit upper bound on the dictionary size by...
Francis Bach, Julien Mairal, Jean Ponce
ISI
2008
Springer
13 years 9 months ago
A Collaborative Forensics Framework for VoIP Services in Multi-network Environments
We propose a collaborative forensics framework to trace back callers of VoIP services in a multi-network environment. The paper is divided into two parts. The first part discusses ...
Hsien-Ming Hsu, Yeali S. Sun, Meng Chang Chen
ENTCS
2007
105views more  ENTCS 2007»
13 years 9 months ago
A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
When modelling cryto-protocols by means of process calculi which express both nondeterministic and probabilistic behavior, it is customary to view the scheduler as an intruder. It...
Srecko Brlek, Sardaouna Hamadou, John Mullins
GIS
2002
ACM
13 years 9 months ago
Aggregation and comparison of trajectories
Dealing with moving objects necessitates having available complete geographical traces for determining exact or possible locations that objects have had, have or will have. This i...
Nirvana Meratnia, Rolf A. de By