Sciweavers

2059 search results - page 284 / 412
» A Directed Threshold - Signature Scheme
Sort
View
AVBPA
2003
Springer
140views Biometrics» more  AVBPA 2003»
15 years 10 months ago
Feature Extraction Using a Chaincoded Contour Representation of Fingerprint Images
A feature extraction method using the chaincode representation of fingerprint ridge contours is presented for use by Automatic Fingerprint Identification Systems. The representa...
Venu Govindaraju, Zhixin Shi, John Schneider
EUROCRYPT
2003
Springer
15 years 10 months ago
Cryptanalysis of the Public-Key Encryption Based on Braid Groups
At CRYPTO 2000, a new public-key encryption based on braid groups was introduced. This paper demonstrates how to solve its underlying problem using the Burau representation. By thi...
Eonkyung Lee, Je Hong Park
FSTTCS
2003
Springer
15 years 10 months ago
Moderately Hard Functions: From Complexity to Spam Fighting
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
Moni Naor
IMR
2003
Springer
15 years 9 months ago
Unified Geometry Access for Analysis and Design
This paper presents a comprehensive approach for CAD based geometry handling in support of single and multidisciplinary analysis and design. Unlike previous schemes, the model pre...
Robert Haimes, Curran Crawford
ICDCS
2002
IEEE
15 years 9 months ago
Impact of Network Density on Data Aggregation in Wireless Sensor Networks
In-network data aggregation is essential for wireless sensor networks where energy resources are limited. In a previously proposed data dissemination scheme (directed diffusion wi...
Chalermek Intanagonwiwat, Deborah Estrin, Ramesh G...