Sciweavers

153 search results - page 28 / 31
» Study on a Secure Access Model for the Grid Catalogue
Sort
View
INDOCRYPT
2003
Springer
14 years 27 days ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
14 years 2 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 1 months ago
Estimating the Actual Cost of Transmission System Congestion
This paper describes a methodology that could be used by a utility to estimate the actual cost of congestion on its transmission system using limited, non-state estimator data. Th...
Thomas J. Overbye
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
12 years 11 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
NAR
2007
132views more  NAR 2007»
13 years 7 months ago
Expanded protein information at SGD: new pages and proteome browser
The recent explosion in protein data generated from both directed small-scale studies and largescale proteomics efforts has greatly expanded the quantity of available protein info...
Robert S. Nash, Shuai Weng, Benjamin C. Hitz, Rama...