Sciweavers

963 search results - page 68 / 193
» Conditional Digital Signatures
Sort
View
IJNSEC
2010
152views more  IJNSEC 2010»
13 years 5 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
IACR
2011
136views more  IACR 2011»
12 years 9 months ago
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
We give new methods for generating and using “strong trapdoors” in cryptographic lattices, which are simultaneously simple, efficient, easy to implement (even in parallel), a...
Daniele Micciancio, Chris Peikert
ICPR
2002
IEEE
14 years 11 months ago
A Theory of the Quasi-Static World
We present the theory behind a novel unsupervised method for discovering quasi-static objects, objects that are stationary during some interval of observation, within image sequen...
Brandon C. S. Sanders, Randal C. Nelson, Rahul Suk...
ICANN
2005
Springer
14 years 3 months ago
Self Organizing Map (SOM) Approach for Classification of Power Quality Events
In this work, Self Organizing Map (SOM) is used in order to classify the types of defections in electrical systems, known as Power Quality (PQ) events. The features for classificat...
Emin Germen, Dogãn Gökhan Ece, Öm...
EPIA
2003
Springer
14 years 3 months ago
Using CLIPS to Detect Network Intrusions
We describe how to build a network intrusion detection sensor by slightly modifying NASA’s CLIPS source code introducing some new features. An overview of the system is presente...
Pedro Alípio, Paulo Carvalho, José N...