Sciweavers

6574 search results - page 24 / 1315
» Current Signatures: Application
Sort
View
E2EMON
2006
IEEE
14 years 3 months ago
A Hybrid Approach for Accurate Application Traffic Identification
—The traffic dynamics of the Internet’s dominant applications, such as peer-to-peer and multimedia, worsen the accuracy of the existing application traffic identification. Ther...
Young J. Won, Byung-Chul Park, Hong-Taek Ju, Myung...
PKC
2004
Springer
195views Cryptology» more  PKC 2004»
14 years 3 months ago
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
13 years 11 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
MBUI
2004
146views User Interface» more  MBUI 2004»
13 years 11 months ago
Model-Based Design and new user Interfaces: Current Practices and Opportunities
In conventional applications it is easy to find detailed and structured practices that make use of models in order to describe almost every aspect of the user interface. On the ot...
José Pascual Molina Massó, Pascual G...
IJON
2008
105views more  IJON 2008»
13 years 9 months ago
A comprehensive review of current local features for computer vision
Local features are widely utilized in a large number of applications, e.g., object categorization, image retrieval, robust matching, and robot localization. In this review, we foc...
Jing Li, Nigel M. Allinson