Sciweavers

468 search results - page 53 / 94
» A Certified Digital Signature
Sort
View
CBMS
2003
IEEE
14 years 3 months ago
Localizing Contour Points for Indexing an X-Ray Image Retrieval System
Vertebra shape can effectively describe various pathologies found in spine x-ray images. There are some critical regions on the shape contour which help determine whether the shap...
Xiaoqian Xu, D. J. Lee, Sameer Antani, L. Rodney L...
CCS
2001
ACM
14 years 2 months ago
Flexible authentication of XML documents
XML is increasingly becoming the format of choice for information exchange on the Internet. As this trend grows, one can expect that documents (or collections thereof) may get qui...
Premkumar T. Devanbu, Michael Gertz, April Kwong, ...
ISW
2001
Springer
14 years 2 months ago
Persistent Authenticated Dictionaries and Their Applications
Abstract. We introduce the notion of persistent authenticated dictionaries, that is, dictionaries where the user can make queries of the type “was element e in set S at time t?â€...
Aris Anagnostopoulos, Michael T. Goodrich, Roberto...
CRYPTO
1992
Springer
138views Cryptology» more  CRYPTO 1992»
14 years 2 months ago
Designing and Detecting Trapdoors for Discrete Log Cryptosystems
Using a number field sieve, discrete logarithms modulo primes of special forms can be found faster than standard primes. This has raised concerns about trapdoors in discrete log cr...
Daniel M. Gordon
SPW
1997
Springer
14 years 2 months ago
Secure Books: Protecting the Distribution of Knowledge
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
Ross J. Anderson, Václav Matyás Jr.,...