Sciweavers

930 search results - page 102 / 186
» A Universal Encryption Standard
Sort
View
CVPR
2009
IEEE
15 years 4 months ago
Reducing JointBoost-Based Multiclass Classification to Proximity Search
Boosted one-versus-all (OVA) classifiers are commonly used in multiclass problems, such as generic object recognition, biometrics-based identification, or gesture recognition. Join...
Alexandra Stefan (University of Texas at Arlington...
ISMIR
2000
Springer
225views Music» more  ISMIR 2000»
14 years 1 months ago
Beyond VARIATIONS: Creating a Digital Music Library
This presentation will focus primarily on work being done at Indiana University in the area of digital music libraries, with some discussion of related efforts. Indiana University...
Jon W. Dunn
WWW
2004
ACM
14 years 10 months ago
Integrating elliptic curve cryptography into the web's security infrastructure
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make...
Vipul Gupta, Douglas Stebila, Sheueling Chang Shan...
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
14 years 10 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander
STOC
2003
ACM
142views Algorithms» more  STOC 2003»
14 years 10 months ago
Optimal probabilistic fingerprint codes
We construct binary codes for fingerprinting. Our codes for n users that are -secure against c pirates have length O(c2 log(n/ )). This improves the codes proposed by Boneh and Sh...
Gábor Tardos