Sciweavers

953 search results - page 153 / 191
» A note on the paper
Sort
View
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
13 years 11 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
ERCIMDL
2000
Springer
140views Education» more  ERCIMDL 2000»
13 years 11 months ago
Associative and Spatial Relationships in Thesaurus-Based Retrieval
The OASIS (Ontologically Augmented Spatial Information System) project explores terminology systems for thematic and spatial access in digital library applications. A prototype im...
Harith Alani, Christopher B. Jones, Douglas Tudhop...
ISN
1998
Springer
13 years 11 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
CIARP
2008
Springer
13 years 9 months ago
Pose Estimation for Sensors Which Capture Cylindric Panoramas
This paper shows that there exist linear models for sensor pose estimation for multi-view panoramas defined by a symmetric or leveled pair of cylindric images. It assumes that pair...
Fay Huang, Reinhard Klette, Yun-Hao Xie
SIROCCO
2007
13 years 9 months ago
Fast Periodic Graph Exploration with Constant Memory
We consider the problem of periodic exploration of all nodes in undirected graphs by using a nite state automaton called later a robot. The robot, using a constant number of state...
Leszek Gasieniec, Ralf Klasing, Russell A. Martin,...