Sciweavers

766 search results - page 41 / 154
» How to Read a Signature
Sort
View
CRYPTO
1992
Springer
138views Cryptology» more  CRYPTO 1992»
14 years 2 months ago
Designing and Detecting Trapdoors for Discrete Log Cryptosystems
Using a number field sieve, discrete logarithms modulo primes of special forms can be found faster than standard primes. This has raised concerns about trapdoors in discrete log cr...
Daniel M. Gordon
IEEEARES
2009
IEEE
13 years 7 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek
CVPR
2003
IEEE
14 years 12 months ago
Directional Histogram Model for Three-Dimensional Shape Similarity
In this paper, we propose a novel shape representation we call Directional Histogram Model (DHM). It captures the shape variation of an object and is invariant to scaling and rigi...
Xinguo Liu, Robin Sun, Sing Bing Kang, Heung-Yeung...
IMA
2009
Springer
124views Cryptology» more  IMA 2009»
14 years 4 months ago
Comparing with RSA
A multi-set (ms) is a set where an element can occur more than once. ms hash functions (mshfs) map mss of arbitrary cardinality to fixed-length strings. This paper introduces a ne...
Julien Cathalo, David Naccache, Jean-Jacques Quisq...
AINA
2006
IEEE
14 years 4 months ago
Remote Trust with Aspect-Oriented Programming
Given a client/server application, how can the server entrust the integrity of the remote client, albeit the latter is running on an un-trusted machine? To address this research p...
Paolo Falcarin, Riccardo Scandariato, Mario Baldi