Sciweavers

373 search results - page 26 / 75
» Two Attacks on Reduced IDEA
Sort
View
FSE
2008
Springer
193views Cryptology» more  FSE 2008»
13 years 9 months ago
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
The stream cipher Salsa20 was introduced by Bernstein in 2005 as a candidate in the eSTREAM project, accompanied by the reduced versions Salsa20/8 and Salsa20/12. ChaCha is a varia...
Jean-Philippe Aumasson, Simon Fischer 0002, Shahra...
ISICA
2009
Springer
14 years 2 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
ACSAC
2005
IEEE
14 years 1 months ago
ScriptGen: an automated script generation tool for honeyd
Honeyd [14] is a popular tool developed by Niels Provos that offers a simple way to emulate services offered by several machines on a single PC. It is a so called low interaction ...
Corrado Leita, Ken Mermoud, Marc Dacier
ICMCS
2005
IEEE
109views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Communication in Crisis Situations Using Icon Language
To reduce the ambiguity and the different semantic interpretation of human observers’ reports, we propose a new paradigm in collaborating information using icons to represent co...
Siska Fitrianie, Léon J. M. Rothkrantz
ICPR
2010
IEEE
13 years 10 months ago
Recognition of Blurred Faces Via Facial Deblurring Combined with Blur-Tolerant Descriptors
Blur is often present in real-world images and significantly affects the performance of face recognition systems. To improve the recognition of blurred faces, we propose a new ap...
Abdenour Hadid, Masashi Nishiyama, Yoichi Sato