Sciweavers

117 search results - page 7 / 24
» A Comparison of Cryptography Courses
Sort
View
ITCC
2005
IEEE
14 years 1 months ago
A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor
In many applications a software implementation of ECC (Elliptic Curve Cryptography) might be inappropriate due to performance requirements, therefore hardware implementations are ...
Fabio Sozzani, Guido Bertoni, Stefano Turcato, Luc...
IJACT
2008
76views more  IJACT 2008»
13 years 7 months ago
A tapestry of identity-based encryption: practical frameworks compared
Abstract: This paper surveys the practical benefits and drawbacks of several identitybased encryption schemes based on bilinear pairings. After providing some background on identit...
Xavier Boyen
AH
2006
Springer
13 years 11 months ago
eDAADe: An Adaptive Recommendation System for Comparison and Analysis of Architectural Precedents
We built a Web-based adaptive recommendation system for students to select and suggest architectural cases when they analyze "Case Study" work within the architectural de...
Shu-Feng Pan, Ji-Hyun Lee
DAS
2006
Springer
13 years 11 months ago
Performance Comparison of Six Algorithms for Page Segmentation
Abstract. This paper presents a quantitative comparison of six algorithms for page segmentation: X-Y cut, smearing, whitespace analysis, constrained text-line finding, Docstrum, an...
Faisal Shafait, Daniel Keysers, Thomas M. Breuel
TSD
2000
Springer
13 years 11 months ago
Comparison of Frequency Bands in Closed Set Speaker Identification Performance
Lots of words can be said about the importance of speaker identification for people, but no word might be as meaningful as the imagination of a life without having any speaker iden...
Özgür Devrim Orman, Levent M. Arslan