Sciweavers

267 search results - page 8 / 54
» Signatures of Combinatorial Maps
Sort
View
E2EMON
2006
IEEE
14 years 3 months ago
A Hybrid Approach for Accurate Application Traffic Identification
—The traffic dynamics of the Internet’s dominant applications, such as peer-to-peer and multimedia, worsen the accuracy of the existing application traffic identification. Ther...
Young J. Won, Byung-Chul Park, Hong-Taek Ju, Myung...
AFRICACRYPT
2008
Springer
14 years 3 months ago
Cryptanalysis of the TRMS Signature Scheme of PKC'05
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) signature scheme [9] proposed at PKC’05. To do so, we present a hybrid approach for so...
Luk Bettale, Jean-Charles Faugère, Ludovic ...
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
14 years 3 months ago
A Practical and Tightly Secure Signature Scheme Without Hash Function
In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA problem) were independently introduced: the Gennaro-Halevi-Rabin (GHR) signature scheme and the...
Benoît Chevallier-Mames, Marc Joye
ICANN
2005
Springer
14 years 2 months ago
Self Organizing Map (SOM) Approach for Classification of Power Quality Events
In this work, Self Organizing Map (SOM) is used in order to classify the types of defections in electrical systems, known as Power Quality (PQ) events. The features for classificat...
Emin Germen, Dogãn Gökhan Ece, Öm...
SMI
2006
IEEE
138views Image Analysis» more  SMI 2006»
14 years 3 months ago
Curves-on-Surface: A General Shape Comparison Framework
We develop a new surface matching framework to handle surface comparisons based on a novel mathematical analysis of curves on surfaces, and propose a unique signature for any clos...
Xin Li, Ying He 0001, Xianfeng Gu, Hong Qin