Sciweavers

112 search results - page 15 / 23
» Short Randomizable Signatures
Sort
View
ICIP
2010
IEEE
13 years 5 months ago
Multimedia forensic hash based on visual words
In recent years, digital images and videos have become increasingly popular over the internet and bring great social impact to a wide audience. In the meanwhile, technology advanc...
Wenjun Lu, Min Wu
BIOINFORMATICS
2005
134views more  BIOINFORMATICS 2005»
13 years 7 months ago
Outcome signature genes in breast cancer: is there a unique set?
Motivation: direct bearing whose expres Sorlie et al., 2 gene sets is a diseases (Lossos et al., 2004; Miklos and Maleszka, 2004), and the variables that could account questions i...
Liat Ein-Dor, Itai Kela, Gad Getz, David Givol, Ey...
AVSS
2007
IEEE
14 years 1 months ago
Detecting hidden objects: Security imaging using millimetre-waves and terahertz
There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Radiation at these fre...
Mike C. Kemp
ASIACRYPT
2000
Springer
13 years 11 months ago
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message us...
Jean-Sébastien Coron, François Koeun...
INFOCOM
1998
IEEE
13 years 11 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai