Sciweavers

530 search results - page 44 / 106
» Practical Threshold Signatures
Sort
View
PKC
2000
Springer
166views Cryptology» more  PKC 2000»
13 years 11 months ago
Design Validations for Discrete Logarithm Based Signature Schemes
A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while t...
Ernest F. Brickell, David Pointcheval, Serge Vaude...
BMCBI
2010
127views more  BMCBI 2010»
13 years 8 months ago
Deriving enzymatic and taxonomic signatures of metagenomes from short read data
Background: We propose a method for deriving enzymatic signatures from short read metagenomic data of unknown species. The short read data are converted to six pseudo-peptide cand...
Uri Weingart, Erez Persi, Uri Gophna, David Horn
CORR
2004
Springer
97views Education» more  CORR 2004»
13 years 7 months ago
Planning for Directory Services in Public Key Infrastructures
: In this paper we provide a guide for public key infrastructure designers and administrators when planning for directory services. We concentrate on the LDAP directories and how t...
Vangelis Karatsiolis, Marcus Lippert, Alexander Wi...
CIKM
2003
Springer
14 years 1 months ago
Online duplicate document detection: signature reliability in a dynamic retrieval environment
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. Few users wish to retri...
Jack G. Conrad, Xi S. Guo, Cindy P. Schriber
CVPR
2008
IEEE
14 years 10 months ago
ANSIG - An analytic signature for permutation-invariant two-dimensional shape representation
Many applications require a computer representation of 2D shape, usually described by a set of 2D points. The challenge of this representation is that it must not only capture the...
José J. Rodrigues, Pedro M. Q. Aguiar, Jo&a...