Sciweavers

6574 search results - page 44 / 1315
» Current Signatures: Application
Sort
View
ECCV
2008
Springer
15 years 19 days ago
Signature-Based Document Image Retrieval
As the most pervasive method of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effectiv...
Guangyu Zhu, Yefeng Zheng, David S. Doermann
ASIACRYPT
2006
Springer
14 years 2 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
ICT
2004
Springer
181views Communications» more  ICT 2004»
14 years 4 months ago
Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS
Abstract. This paper presents the ADenoIdS intrusion detection system (IDS). ADenoIdS takes some architectural inspiration from the human immune system and automates intrusion reco...
F. S. de Paula, P. L. de Geus
ICPR
2000
IEEE
14 years 3 months ago
3D Objects Coding and Recognition Using Surface Signatures
This paper presents a new concept for 3D coding of freeform surfaces. The proposed coding technique uses the surface signature representation scheme [1]. This representation schem...
Sameh M. Yamany, Aly A. Farag
SIGMOD
1993
ACM
140views Database» more  SIGMOD 1993»
14 years 2 months ago
Second-Order Signature: A Tool for Specifying Data Models, Query Processing, and Optimization
Abstract: We propose a framework for the specification of extensible database systems. A particular goal is to implement a software component for parsing and rule-based optimizatio...
Ralf Hartmut Güting