Sciweavers

113 search results - page 15 / 23
» Short Structure-Preserving Signatures
Sort
View
BIOINFORMATICS
2005
134views more  BIOINFORMATICS 2005»
13 years 9 months ago
Outcome signature genes in breast cancer: is there a unique set?
Motivation: direct bearing whose expres Sorlie et al., 2 gene sets is a diseases (Lossos et al., 2004; Miklos and Maleszka, 2004), and the variables that could account questions i...
Liat Ein-Dor, Itai Kela, Gad Getz, David Givol, Ey...
AVSS
2007
IEEE
14 years 4 months ago
Detecting hidden objects: Security imaging using millimetre-waves and terahertz
There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Radiation at these fre...
Mike C. Kemp
ASIACRYPT
2000
Springer
14 years 2 months ago
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message us...
Jean-Sébastien Coron, François Koeun...
INFOCOM
1998
IEEE
14 years 1 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai
EUROCRYPT
2001
Springer
14 years 2 months ago
Lower Bounds for Multicast Message Authentication
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the...
Dan Boneh, Glenn Durfee, Matthew K. Franklin