Sciweavers

12459 search results - page 92 / 2492
» cans 2006
Sort
View
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 9 months ago
A Forward-Secure User Authentication Scheme with Smart Cards
In 2004, Yoon et al. proposed a user authentication scheme based on generalized ElGamal signature scheme using smart cards. In their scheme, the previous session keys will be comp...
Bin Wang, Zheng-Quan Li
IJNSEC
2006
75views more  IJNSEC 2006»
13 years 9 months ago
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
The Short Secret Sharing Protocols (S3P), proposed by Roe et al in 1998 [13] and revised in 2003 [14], is a family of protocols that bootstrap secure session keys from weak secret...
Jolyon Clulow
IJON
2006
77views more  IJON 2006»
13 years 9 months ago
Synchronization effects using a piecewise linear map-based spiking-bursting neuron model
Models of neurons based on iterative maps allows the simulation of big networks of coupled neurons without loss of biophysical properties such as spiking, bursting or tonic bursti...
Carlos Aguirre, Doris Campos, Pedro Pascual, Eduar...
IJON
2006
127views more  IJON 2006»
13 years 9 months ago
Sparse ICA via cluster-wise PCA
In this paper, it is shown that Independent Component Analysis (ICA) of sparse signals (sparse ICA) can be seen as a cluster-wise Principal Component Analysis (PCA). Consequently,...
Massoud Babaie-Zadeh, Christian Jutten, Ali Mansou...
IJON
2006
88views more  IJON 2006»
13 years 9 months ago
Image binarization focusing on objects
: In this paper, an image binarization method based on a new discriminant criterion is proposed. The criterion emphasizes much the homogeneity of the object gray level distribution...
Songcan Chen, Daohong Li