Sciweavers

6574 search results - page 8 / 1315
» Current Signatures: Application
Sort
View
MINENET
2005
ACM
14 years 2 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
ICDAR
2007
IEEE
14 years 3 months ago
Curvelets Based Queries for CBIR Application in Handwriting Collections
This paper presents a new use of the Curvelet transform as a multiscale method for indexing linear singularities and curved handwritten shapes in documents images. As it belongs t...
Guillaume Joutel, Véronique Eglin, St&eacut...
SEC
2007
13 years 10 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...
INDOCRYPT
2004
Springer
14 years 2 months ago
Separable Linkable Threshold Ring Signatures
A ring signature scheme is a group signature scheme with no group manager to setup a group or revoke a signer. A linkable ring signature, introduced by Liu, et al. [20], additional...
Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man...
CCR
2000
93views more  CCR 2000»
13 years 9 months ago
On the validity of digital signatures
An important feature of digital signatures is to serve as nonrepudiation evidence. To be eligible as non-repudiation evidence, a digital signature on an electronic document should...
Jianying Zhou, Robert H. Deng