Sciweavers

766 search results - page 33 / 154
» How to Read a Signature
Sort
View
CEAS
2007
Springer
14 years 1 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton
SACRYPT
1998
Springer
13 years 11 months ago
Computational Alternatives to Random Number Generators
In this paper, we present a simple method for generating random-based signatures when random number generators are either unavailable or of suspected quality (malicious or accident...
David M'Raïhi, David Naccache, David Pointche...
ICFP
2005
ACM
14 years 7 months ago
An expressive language of signatures
Current languages allow a programmer to describe an interface only by enumerating its parts, possibly including other interfaces wholesale. Such languages cannot express relations...
Norman Ramsey, Kathleen Fisher, Paul Govereau
ICIP
2006
IEEE
14 years 9 months ago
Robust Signature-Based Geometric Invariant Copyright Protection
The most significant bit (MSB)-plane of an image is least likely to change by the most signal processing operations. Watermarking techniques are, however, unable to exploit the MS...
Mohammad Awrangjeb, M. Manzur Murshed
BIOID
2008
103views Biometrics» more  BIOID 2008»
13 years 9 months ago
Promoting Diversity in Gaussian Mixture Ensembles: An Application to Signature Verification
Abstract. Classifiers based on Gaussian mixture models are good performers in many pattern recognition tasks. Unlike decision trees, they can be described as stable classifier: a s...
Jonas Richiardi, Andrzej Drygajlo, Laetitia Todesc...