Sciweavers

530 search results - page 41 / 106
» Practical Threshold Signatures
Sort
View
GLOBECOM
2006
IEEE
15 years 8 months ago
On the Effectiveness of Service Registration-Based Worm Defense
— Existing Internet worm research focuses either on worm detection inside an AS, or on prevention of Internet-wide worm epidemic. But of more practical concern is how to repel wo...
Jin-Ho Kim, Hyogon Kim, Saewoong Bahk
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
13 years 10 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...
110
Voted
MICCAI
2003
Springer
16 years 3 months ago
De-noising SPECT/PET Images Using Cross-Scale Regularization
De-noising of SPECT and PET images is a challenging task due to the inherent low signal-to-noise ratio of acquired data. Wavelet based multiscale denoising methods typically apply ...
Yinpeng Jin, Elsa D. Angelini, Peter D. Esser, And...
EUROCRYPT
2007
Springer
15 years 6 months ago
Cryptanalysis of SFLASH with Slightly Modified Parameters
SFLASH is a signature scheme which belongs to a family of multivariate schemes proposed by Patarin et al. in 1998 [9]. The SFLASH scheme itself has been designed in 2001 [8] and ha...
Vivien Dubois, Pierre-Alain Fouque, Jacques Stern
150
Voted
IGARSS
2009
15 years 2 days ago
Spatially Adaptive Classification of Hyperspectral Data with Gaussian Processes
Automated classification of land cover types based on hyperspectral imagery often involves a large geographical area, but class labels are available for only small portions of the...
Goo Jun, Joydeep Ghosh