Sciweavers

242 search results - page 16 / 49
» Practical Digital Signature Generation Using Biometrics
Sort
View
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 1 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
HICSS
2005
IEEE
130views Biometrics» more  HICSS 2005»
14 years 1 months ago
BiRD: A Strategy to Autonomously Supplement Clinical Practice Guidelines with Related Clinical Studies
In this paper we introduce a framework to supplement and tag computerized CPG with related best-evidence automatically sourced from on-line medical literature repositories. The id...
Syed Sibte Raza Abidi, Michael Kershaw, Evangelos ...
IJACT
2008
158views more  IJACT 2008»
13 years 7 months ago
Efficient lattice-based signature scheme
: In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, in which security is related to the hardness of approximat...
Thomas Plantard, Willy Susilo, Khin Than Win, Qion...
CCS
2004
ACM
14 years 1 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
CRYPTO
1992
Springer
138views Cryptology» more  CRYPTO 1992»
13 years 11 months ago
Designing and Detecting Trapdoors for Discrete Log Cryptosystems
Using a number field sieve, discrete logarithms modulo primes of special forms can be found faster than standard primes. This has raised concerns about trapdoors in discrete log cr...
Daniel M. Gordon