Sciweavers

70 search results - page 8 / 14
» sp 2007
Sort
View
CHES
2007
Springer
122views Cryptology» more  CHES 2007»
14 years 2 months ago
Two New Techniques of Side-Channel Cryptanalysis
Abstract. We describe two new techniques of side-channel cryptanalysis which we call the impossible collision attack and the multiset collision attack. These are inspired by the st...
Alex Biryukov, Dmitry Khovratovich
IJAIT
2007
108views more  IJAIT 2007»
13 years 8 months ago
Document Retrieval by Projection Based Frequency Distribution
In document retrieval task, random projection (RP) is a useful technique of dimension reduction. It can be obtained very quickly yet the recalculation is not necessary to any chang...
Isamu Shioya, Hirohito Oh'uchi, Takao Miura
IJNSEC
2007
127views more  IJNSEC 2007»
13 years 8 months ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
14 years 2 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 2 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia