Sciweavers

373 search results - page 15 / 75
» Two Attacks on Reduced IDEA
Sort
View
PAMI
2007
185views more  PAMI 2007»
13 years 7 months ago
A Two-Level Generative Model for Cloth Representation and Shape from Shading
In this paper we present a two-level generative model for representing the images and surface depth maps of drapery and clothes. The upper level consists of a number of folds whic...
Feng Han, Song Chun Zhu
CCS
2006
ACM
13 years 11 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
ICMCS
1999
IEEE
118views Multimedia» more  ICMCS 1999»
13 years 12 months ago
Evaluation of Copyright Marking Systems
Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. Many systems have been...
Fabien A. P. Petitcolas, Ross J. Anderson
ISM
2005
IEEE
84views Multimedia» more  ISM 2005»
14 years 1 months ago
The Protection of QoS for Multimedia Transmission against Denial of Service Attacks
In this paper, a secure and adaptive multimedia transmission framework is proposed to maintain the quality of service (QoS) of the multimedia streams during the Denial-of-Service ...
Hongli Luo, Mei-Ling Shyu
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 5 months ago
Differential Attack on Five Rounds of the SC2000 Block Cipher
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128bit user key is used. It is a CRYPTREC recommen...
Jiqiang Lu