Sciweavers

728 search results - page 11 / 146
» ideas 2009
Sort
View
CCS
2009
ACM
14 years 8 months ago
A new hash family obtained by modifying the SHA-2 family
In this work, we study several properties of the SHA-2 design which have been utilized in recent collision attacks against reduced round SHA-2. Small modifications to the SHA-2 des...
Somitra Kumar Sanadhya, Palash Sarkar
ESWS
2009
Springer
13 years 5 months ago
Concept Search
Concept Search extends syntactic search, i.e., search based on the computation of string similarity between words, with semantic search, i.e., search based on the computation of s...
Fausto Giunchiglia, Uladzimir Kharkevich, Ilya Zai...
GD
2009
Springer
14 years 3 days ago
Fast Edge-Routing for Large Graphs
To produce high quality drawings of graphs with nodes drawn as shapes it is important to find routes for the edges which do not intersect node boundaries. Recent work in this area...
Tim Dwyer, Lev Nachmanson
ICITS
2009
13 years 5 months ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka
ICIP
2009
IEEE
14 years 8 months ago
Isocentric Color Saliency In Images
In this paper we propose a novel computational method to infer visual saliency in images. The computational method is based on the idea that salient objects should have local char...