Sciweavers

2421 search results - page 195 / 485
» Message from the Co-Chairs
Sort
View
IACR
2011
192views more  IACR 2011»
12 years 9 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
ESORICS
2012
Springer
12 years 2 days ago
Unique Group Signatures
We initiate the study of unique group signature such that signatures of the same message by the same user will always have a large common component (i.e., unique identifier). It ...
Matthew K. Franklin, Haibin Zhang
APSEC
2006
IEEE
14 years 3 months ago
Project Replayer with Email Analysis - Revealing Contexts in Software Development
In many software development projects, people tend to repeat same mistakes due to lack of shared knowledge from past experiences. Generally, it is very difficult to manually find ...
Kimiharu Okura, Keita Goto, Noriko Hanakawa, Shinj...
AUSAI
2008
Springer
13 years 11 months ago
Learning a Generative Model for Structural Representations
Abstract. Graph-based representations have been used with considercess in computer vision in the abstraction and recognition of object shape and scene structure. Despite this, the ...
Andrea Torsello, David L. Dowe
AI
2004
Springer
13 years 9 months ago
Brain-actuated interaction
Over the last years evidence has accumulated that shows the possibility to analyze human brain activity on-line and translate brain states into actions such as selecting a letter ...
José del R. Millán, Fréd&eacu...