Sciweavers

294 search results - page 13 / 59
» Efficient Confirmer Signatures from the
Sort
View
CRYPTO
2008
Springer
84views Cryptology» more  CRYPTO 2008»
13 years 11 months ago
Improved Bounds on Security Reductions for Discrete Log Based Signatures
Despite considerable research efforts, no efficient reduction from the discrete log problem to forging a discrete log based signature (e.g. Schnorr) is currently known. In fact, ne...
Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Loka...
BMCBI
2010
94views more  BMCBI 2010»
13 years 10 months ago
A high-throughput pipeline for the design of real-time PCR signatures
Background: Pathogen diagnostic assays based on polymerase chain reaction (PCR) technology provide high sensitivity and specificity. However, the design of these diagnostic assays...
Ravi Vijaya Satya, Kamal Kumar, Nela Zavaljevski, ...
ICPR
2006
IEEE
14 years 11 months ago
Motion Features from Lip Movement for Person Authentication
This paper describes a new motion based feature extraction technique for speaker identification using orientation estimation in 2D manifolds. The motion is estimated by computing ...
Josef Bigün, Maycel Isaac Faraj
WABI
2004
Springer
107views Bioinformatics» more  WABI 2004»
14 years 3 months ago
Phylogenetic Super-networks from Partial Trees
—In practice, one is often faced with incomplete phylogenetic data, such as a collection of partial trees or partial splits. This paper poses the problem of inferring a phylogene...
Daniel H. Huson, Tobias Dezulian, Tobias H. Kl&oum...
FORTE
1998
13 years 11 months ago
Hardware synthesis from protocol specifications in LOTOS
: In this paper, we propose a technique for hardware implementation of protocol specifications in LOTOS. For the purpose, we define a new model called synchronous EFSMs consisting ...
Keiichi Yasumoto, Akira Kitajima, Teruo Higashino,...