Sciweavers

262 search results - page 35 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
ISI
2007
Springer
13 years 7 months ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
ICB
2009
Springer
355views Biometrics» more  ICB 2009»
14 years 2 months ago
3D Signatures for Fast 3D Face Recognition
We propose a vector representation (called a 3D signature) for 3D face shape in biometrics applications. Elements of the vector correspond to fixed surface points in a face-centere...
Chris Boehnen, Tanya Peters, Patrick J. Flynn
EUROCRYPT
1999
Springer
14 years 8 days ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
WISEC
2010
ACM
13 years 8 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ACCV
2010
Springer
13 years 3 months ago
Descriptor Learning Based on Fisher Separation Criterion for Texture Classification
Abstract. This paper proposes a novel method to deal with the representation issue in texture classification. A learning framework of image descriptor is designed based on the Fish...
Yimo Guo, Guoying Zhao, Matti Pietikäinen, Zh...