Sciweavers

364 search results - page 26 / 73
» E-Voting System Security Optimization
Sort
View
OSDI
2008
ACM
14 years 8 months ago
From Optimization to Regret Minimization and Back Again
Internet routing is mostly based on static information-it's dynamicity is limited to reacting to changes in topology. Adaptive performance-based routing decisions would not o...
Ioannis C. Avramopoulos, Jennifer Rexford, Robert ...
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer
ISCAS
2006
IEEE
108views Hardware» more  ISCAS 2006»
14 years 2 months ago
An optimal normal basis elliptic curve cryptoprocessor for inductive RFID application
In this paper a 173-bit type II ONB ECC processor Section II introduces the mathematical backgrounds for for inductive RFID applications is described. Compared with curve operation...
Pak-Keung Leung, Oliver Chiu-sing Choy, Cheong-fat...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 12 days ago
Indistinguishability Amplification
system is the abstraction of the input-output behavior of any kind of discrete system, in particular cryptographic systems. Many aspects of cryptographic security analyses and pro...
Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner
IEEEARES
2006
IEEE
14 years 2 months ago
Offline Internet Banking Fraud Detection
Nowadays, most important topic about internet banking is security. Banks’ basic concern is ensuring their customers’ electronic transactions. Nevertheless, fraudsters are beco...
Vasilis Aggelis