Sciweavers

1834 search results - page 269 / 367
» Public Key Cryptography
Sort
View
INFORMATICALT
2008
139views more  INFORMATICALT 2008»
13 years 7 months ago
Fingerprint Minutiae Matching without Global Alignment Using Local Structures
This paper presents a method of minutiae based fingerprint matching that is robust to deformations and does not do fingerprint alignment. It concentrates on comparing rotation and ...
Andrej Kisel, Alexej Kochetkov, Justas Kranauskas
IJAMC
2006
53views more  IJAMC 2006»
13 years 7 months ago
Exploring the situated context of knowledge management in e-government development
: In the past decade, knowledge management has played a critical and active role in business settings at the organisation level. Recently, the importance of knowledge management is...
Haiyan Huang, Benjamin Yeo, Eileen M. Trauth
IS
2008
13 years 7 months ago
An analysis of XQuery benchmarks
This paper presents a survey and an analysis of the XQuery benchmark publicly available in 2006 -- XMach-1, XMark, X007, the Michigan benchmark, and XBench -- from different persp...
Loredana Afanasiev, Maarten Marx
IJEB
2006
63views more  IJEB 2006»
13 years 7 months ago
An analysis and comparison of web development between local governments and SMEs in Spain
: The internet has emerged as a key channel for both firms and governments. E-government programmes are diverse, and difficult to assess and compare with e-business initiatives. Th...
Pedro Soto-Acosta, Angel L. Merono-Cerdan
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 7 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu