Sciweavers

625 search results - page 27 / 125
» Generalized Ring Signatures
Sort
View
NDSS
2006
IEEE
14 years 1 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
IPL
2000
72views more  IPL 2000»
13 years 7 months ago
Generalized interpolation in CASL
In this paper we consider the partial many-sorted first-order logic and its extension to the subsorted partial many-sorted first-order logic that underly the Casl specification fo...
Tomasz Borzyszkowski
BMCBI
2008
135views more  BMCBI 2008»
13 years 7 months ago
Identification of a small optimal subset of CpG sites as bio-markers from high-throughput DNA methylation profiles
Background: DNA methylation patterns have been shown to significantly correlate with different tissue types and disease states. High-throughput methylation arrays enable large-sca...
Hailong Meng, Edward Lenn Murrelle, Guoya Li
ICIP
1998
IEEE
14 years 9 months ago
The Variable-Length Generalized Lapped Biorthogonal Transform
This paper introduces a class of linear phase lapped biorthogonal transforms with basis functions of variable length VLGLBT. The transform can be characterized by a lattice which ...
Trac D. Tran, Ricardo L. de Queiroz, Truong Q. Ngu...
DCC
2007
IEEE
14 years 7 months ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild