Sciweavers

269 search results - page 9 / 54
» Templates as Master Keys
Sort
View
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 7 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
WACV
2007
IEEE
14 years 1 months ago
Fast Multi-scale Template Matching Using Binary Features
Template matching is one of the key problems in computer vision and has been widely used in tracking, recognition and many other applications. Traditional methods are usually slow...
Feng Tang, Hai Tao
ICMI
2000
Springer
167views Biometrics» more  ICMI 2000»
13 years 11 months ago
Gravity-Center Template Based Human Face Feature Detection
This paper presents a simple and fast technique for geometrical feature detection of several human face organs such as eyes and mouth. Human face gravity-center template is firstly...
Jun Miao, Wen Gao, Yiqiang Chen, Jie Lu
ASIACRYPT
2008
Springer
13 years 9 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
ERSA
2006
132views Hardware» more  ERSA 2006»
13 years 8 months ago
Combinatorial Optimization in Mapping Generalized Template Matching onto Reconfigurable Computers
: A brief review of mapping generalized template matching operations onto reconfigurable computers is given. A combinatorial optimization process, where the objective is to minimiz...
Xuejun Liang, Qutaibah M. Malluhi