Sciweavers

625 search results - page 36 / 125
» Generalized Ring Signatures
Sort
View
CCS
2009
ACM
14 years 2 months ago
CoSP: a general framework for computational soundness proofs
We describe CoSP, a general framework for conducting computational soundness proofs of symbolic models and for embedding these proofs into formal calculi. CoSP considers arbitrary...
Michael Backes, Dennis Hofheinz, Dominique Unruh
AES
2004
Springer
151views Cryptology» more  AES 2004»
14 years 29 days ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
14 years 25 days ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
ICCAD
1997
IEEE
78views Hardware» more  ICCAD 1997»
13 years 11 months ago
A signature based approach to regularity extraction
Regularity extraction is an important step in the design ow of datapath-dominated circuits. This paper outlines a new method that automatically extracts regular structures from th...
Srinivasa Rao Arikati, Ravi Varadarajan
ICIP
2004
IEEE
14 years 9 months ago
A new similarity measure using hausdorff distance map
Image dissimilarity measure is a hot topic. The measure process is generally composed of an information mining in each image which results in an image signature and then a signatu...
Etienne Baudrier, Frédéric Nicolier,...