Sciweavers

1094 search results - page 127 / 219
» List signature schemes
Sort
View
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 9 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
ICPR
2006
IEEE
14 years 8 months ago
Supervised Image Classification by SOM Activity Map Comparison
This article presents a method aiming at quantifying the visual similarity between two images. This kind of problem is recurrent in many applications such as object recognition, i...
Grégoire Lefebvre, Christophe Laurent, Juli...
ICCSA
2005
Springer
14 years 1 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
14 years 1 months ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart
ICBA
2004
Springer
144views Biometrics» more  ICBA 2004»
14 years 1 months ago
Improving Iris Recognition Accuracy via Cascaded Classifiers
As a reliable approach to human identification, iris recognition has received increasing attention in recent years. In the literature of iris recognition, local feature of image de...
Zhenan Sun, Yunhong Wang, Tieniu Tan, Jiali Cui