Sciweavers

8499 search results - page 17 / 1700
» cans 2009
Sort
View
CVPR
2009
IEEE
1096views Computer Vision» more  CVPR 2009»
15 years 4 months ago
How far can you get with a modern face recognition test set using only simple features?
In recent years, large databases of natural images have become increasingly popular in the evaluation of face and object recognition algorithms. However, Pinto et al. previously ...
Nicolas Pinto, James J. DiCarlo, David D. Cox
CCS
2009
ACM
14 years 4 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
CANS
2009
Springer
153views Cryptology» more  CANS 2009»
14 years 4 months ago
Computing on Encrypted Data
Craig Gentry
CANS
2009
Springer
115views Cryptology» more  CANS 2009»
14 years 4 months ago
Private-Key Hidden Vector Encryption with Key Confidentiality
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CANS
2009
Springer
128views Cryptology» more  CANS 2009»
14 years 4 months ago
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity
Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu