Sciweavers

84 search results - page 9 / 17
» Directed Transitive Signature Scheme
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 7 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
CN
2010
149views more  CN 2010»
13 years 10 months ago
A collaborative P2P scheme for NAT Traversal Server discovery based on topological information
In the current Internet picture more than 70% of the hosts are located behind Network Address Translators (NATs). This is not a problem in the client/server paradigm. However, the...
Rubén Cuevas Rumín, Ángel Cue...
JSAC
2006
172views more  JSAC 2006»
13 years 9 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
ICIP
1999
IEEE
14 years 11 months ago
Wipe Scene Change Detection in Video Sequences
This paper presents a novel algorithm for wipe scene change detection in video sequences. In the proposed scheme, each image in the sequence is mapped to a reduced image. Then we ...
Warnakulasuriya Anil Chandana Fernando, Cedric Nis...
ICASSP
2010
IEEE
13 years 10 months ago
A survey of implementation efforts and experimental design for cooperative communications
Design and analysis of cooperative communication schemes based upon modeling and simulation exist in large quantities in the research literature. Despite this fact, there have bee...
Glenn Bradford, J. Nicholas Laneman