Sciweavers

530 search results - page 31 / 106
» Practical Threshold Signatures
Sort
View
IJISEC
2010
150views more  IJISEC 2010»
13 years 5 months ago
Efficient online/offline identity-based signature for wireless sensor network
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computati...
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanji...
ICASSP
2007
IEEE
13 years 12 months ago
Robust Matched Filters for Target Detection in Hyperspectral Imaging Data
Most detection algorithms for hyperspectral imaging applications assume a target with a perfectly known spectral signature. In practice, the target signature is either imperfectly...
Dimitris Manolakis, Ronald Lockwood, Thomas Cooley...
ETRICS
2006
13 years 11 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
SEC
2000
13 years 9 months ago
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses
The theory of computer viruses has been studied by several authors, though there is no systematic theoretical study up to now. The long time open question in this area is as follo...
Yongge Wang
GCB
2003
Springer
82views Biometrics» more  GCB 2003»
14 years 1 months ago
Threshold extraction in metabolite concentration data
The further development of analytical techniques based on gas chromatography and mass spectrometry now facilitate the generation of larger sets of metabolite concentration data. T...
André Flöter, Jacques Nicolas, Torsten...