A 25-gigabyte “point obfuscation” challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation” is another name for passwor...
In cryptography, forward secrecy is a well-known property for key agreement protocols. It ensures that a session key will remain private even if one of the long-term secret keys is...
Detecting malicious attempts to access computers is difficult with current security applications. Many current applications do not give the user the right information to find and ...
Leliel Trethowen, Craig Anslow, Stuart Marshall, I...
Ring signature enables an user to anonymously sign a message on behalf of a group of users termed as ‘ring’ formed in an ‘ad-hoc’ manner. A naive scheme produces a signatur...
Priyanka Bose, Dipanjan Das 0002, Chandrasekaran P...
— Cloud computing is the emerging field nowadays and it has truly revolutionized the domain of Information Technology. This domain is very large and not easy to handle especially...
—Music mood classification is a crucial component in the field of multimedia database retrieval and computational musicology. There is a constantly growing interest in developing...
Call Level Interfaces (CLI) are low level API that play a key role in database applications whenever a fine tune control between application tiers and the host databases is a key ...
— In this paper a number plate recognition system has been designed using the ant colony optimization technique. This system can be implemented in surveillance systems, detection...
A method for property valuation based on the concept of merging different areas of the city into uniform zones reflecting the characteristics of the real estate market was worked o...
Tadeusz Lasota, Edward Sawilow, Bogdan Trawinski, ...
A new information system for order and yard management was implemented and deployed in a timber products company. The system was equipped with an innovative mechanism which automat...