Sciweavers

868 search results - page 71 / 174
» On Analog Signature Analysis
Sort
View
139
Voted
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
15 years 9 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
153
Voted
ICA
2007
Springer
15 years 10 months ago
Mutual Interdependence Analysis (MIA)
Functional Data Analysis (FDA) is used for datasets that are more meaningfully represented in the functional form. Functional principal component analysis, for instance, is used to...
Heiko Claussen, Justinian Rosca, Robert I. Damper
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
15 years 10 months ago
Enterprise Architecture Analysis with XML
This paper shows how XML can be used for static and dynamic analysis of architectures. Our analysis is based on the distinction between symbolic and semantic models of architectur...
Frank S. de Boer, Marcello M. Bonsangue, Joost Jac...
113
Voted
JCB
2006
97views more  JCB 2006»
15 years 4 months ago
Wavelet Analysis of DNA Walks
A wavelet transform of the DNA "walk" constructed from a genomic sequence offers a direct visualization of short and long-range patterns in nucleotide sequences. We stud...
Adrian D. Haimovich, Bruce Byrne, Ramakrishna Rama...
JDFP
2008
81views more  JDFP 2008»
15 years 4 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler