Sciweavers

134 search results - page 11 / 27
» The First Experimental Cryptanalysis of the Data Encryption ...
Sort
View
CCS
2008
ACM
13 years 9 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...

Publication
197views
12 years 3 months ago
Convex non-negative matrix factorization for massive datasets
Non-negative matrix factorization (NMF) has become a standard tool in data mining, information retrieval, and signal processing. It is used to factorize a non-negative data matrix ...
C. Thurau, K. Kersting, M. Wahabzada, and C. Bauck...
PERCOM
2010
ACM
13 years 5 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...
BIOINFORMATICS
2010
108views more  BIOINFORMATICS 2010»
13 years 5 months ago
Mass spectrometry data processing using zero-crossing lines in multi-scale of Gaussian derivative wavelet
Motivation: Peaks are the key information in Mass Spectrometry (MS) which has been increasingly used to discover diseases related proteomic patterns. Peak detection is an essentia...
Nha Nguyen, Heng Huang, Soontorn Oraintara, An P. ...
PAKDD
2005
ACM
112views Data Mining» more  PAKDD 2005»
14 years 29 days ago
Approximated Clustering of Distributed High-Dimensional Data
In many modern application ranges high-dimensional feature vectors are used to model complex real-world objects. Often these objects reside on different local sites. In this paper,...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...