Sciweavers

373 search results - page 33 / 75
» Two Attacks on Reduced IDEA
Sort
View
ICMCS
1998
IEEE
82views Multimedia» more  ICMCS 1998»
13 years 12 months ago
Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership
Various digital watermarking techniques have been proposed in recent years as the methods to protect the copyright of multimedia data. However, as pointed out by the IBM research ...
Lintian Qiao, Klara Nahrstedt
IACR
2011
120views more  IACR 2011»
12 years 7 months ago
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main t...
David Jao, Luca De Feo
STDBM
2004
Springer
127views Database» more  STDBM 2004»
14 years 1 months ago
Condition Evaluation for Speculative Systems: a Streaming Time Series Case
Application systems often need to react with certain actions whenever some preset conditions are satisfied. In many cases, the evaluation of these conditions takes long time, but...
Xiaoyang Sean Wang, Like Gao, Min Wang
ICIAR
2010
Springer
14 years 14 days ago
Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords?
Graphical passwords have been proposed as an alternative to alphanumeric passwords with their advantages in usability and security. However, they still tend to follow predictable p...
Haichang Gao, Xiuling Chang, Zhongjie Ren, Uwe Aic...
IJSWIS
2007
133views more  IJSWIS 2007»
13 years 7 months ago
Association Rule Ontology Matching Approach
This paper presents a hybrid, extensional and asymmetric matching approach designed to find out semantic relations (equivalence and subsumption) between entities issued from two ...
Jérôme David, Fabrice Guillet, Henri ...