Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is   [Clear All Filters]
Conference Papers
Bateni MH, Golab L, Hajiaghayi MT, Karloff H.  2009.  Scheduling to minimize staleness and stretch in real-time data warehouses. Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures. :29-38.
Sarcia S A, Basili VR, Cantone G.  2009.  Scope error detection and handling concerning software estimation models. Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement. :123-132.
Spring N, Wetherall D, Anderson T.  2003.  Scriptroute: A public Internet measurement facility. Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems-Volume 4. :17-17.
Lu W, M. Wu.  2011.  Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
Song S, JaJa JF.  2009.  Search and Access Strategies for Web Archives. Proceedings of IS&T Archiving 2009.
Daumé H, Langford J, Marcu D.  2005.  Search-based structured prediction as classification. NIPS Workshop on Advances in Structured Learning for Text and Speech Processing, Whistler, Canada.
Tom Yeh, Katz B.  2009.  Searching documentation using text, OCR, and image. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. :776-777.
Oard D, Leuski A.  2003.  Searching recorded speech based on the temporal extent of topic labels. AAAI Spring Symposium on Intelligent Multimedia Knowledge Management.
Tom Yeh, Tollmar K, Darrell T.  2004.  Searching the web with mobile images for location recognition. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 2:76-81.
Song Z, Roussopoulos N.  2003.  SEB-tree: An approach to index continuously moving objects. Mobile Data Management. :340-344.
Dumitras T, Neamtiu I, Tilevich E.  2009.  Second ACM Workshop on Hot Topics in Software Upgrades (HotSWUp 2009). :705-706.
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
Lu W, Varna AL, Swaminathan A, M. Wu.  2009.  Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
Hicks MW, Keromytis AD, Smith JM.  2002.  A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
Katz J, Malka L.  2010.  Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.
Lu W, Varna A, M. Wu.  2011.  Secure video processing: Problems and challenges. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5856-5859.
Mao Y, M. Wu.  2004.  Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
Mao Y, M. Wu.  2006.  Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
Garg R, Varna AL, M. Wu.  2011.  "Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing. Proceedings of the 19th ACM international conference on Multimedia. :23-32.
de Souza C, Froehlich J, Dourish P.  2005.  Seeking the source: software source code as a social and technical artifact. Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work. :197-206.
Zhao L, Davis LS.  2005.  Segmentation and appearance model building from an image sequence. Image Processing, 2005. ICIP 2005. IEEE International Conference on. 1:I-321-4-I-321-4.
Zheng Y, Li H, Doermann D.  2002.  Segmentation and Identification of Handwriting in Noisy Documents. IAPRConference on Document Analysis System. :95-105.

Pages