Sciweavers

380 search results - page 21 / 76
» Time Capsule Signature
Sort
View
CSIE
2009
IEEE
14 years 3 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
DSOM
2007
Springer
14 years 2 months ago
NADA - Network Anomaly Detection Algorithm
This paper deals with a new iterative Network Anomaly Detection Algorithm – NADA, which accomplishes the detection, classification and identification of traffic anomalies. NADA f...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
TRECVID
2007
13 years 9 months ago
INESC, Porto at TRECVID 2007: Automatic and Interactive Video Search
The INESC Porto group has participated in the search task (automatic and interactive). Our approach combines high-level features (the 39 concepts of the LSCOM-Lite set) with low-l...
Catalin Calistru, Cristina Ribeiro, Gabriel David,...
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
14 years 24 days ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman
AISC
2006
Springer
14 years 6 days ago
Hierarchical Representations with Signatures for Large Expression Management
Abstract. We describe a method for managing large expressions in symbolic computations which combines a hierarchical representation with signature calculations. As a case study, th...
Wenqin Zhou, Jacques Carette, David J. Jeffrey, Mi...