Sciweavers

138 search results - page 20 / 28
» A Proposal of Short Proxy Signature using Pairing
Sort
View
JPDC
2006
87views more  JPDC 2006»
13 years 6 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...
BMCBI
2008
128views more  BMCBI 2008»
13 years 6 months ago
SIGffRid: A tool to search for sigma factor binding sites in bacterial genomes using comparative approach and biologically drive
Background: Many programs have been developed to identify transcription factor binding sites. However, most of them are not able to infer two-word motifs with variable spacer leng...
Fabrice Touzain, Sophie Schbath, Isabelle Debled-R...
CVPR
2003
IEEE
14 years 1 days ago
Dynamic Depth Recovery from Unsynchronized Video Streams
In this paper, we propose an algorithm for estimating dense depth information of dynamic scenes from multiple video streams captured using unsynchronized stationary cameras. We so...
Chunxiao Zhou, Hai Tao
ICIP
2010
IEEE
13 years 4 months ago
Multimedia forensic hash based on visual words
In recent years, digital images and videos have become increasingly popular over the internet and bring great social impact to a wide audience. In the meanwhile, technology advanc...
Wenjun Lu, Min Wu
ICPADS
2005
IEEE
14 years 10 days ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...