Sciweavers

1295 search results - page 125 / 259
» informs 1998
Sort
View
IH
1998
Springer
15 years 8 months ago
Biometric yet Privacy Protecting Person Authentication
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners c...
Gerrit Bleumer
BC
1998
76views more  BC 1998»
15 years 4 months ago
An equivalent cable model for neuronal trees with active membrane
A non-uniform equivalent cable model of membrane voltage changes in branching neuronal trees with active ion channels has been developed. A general branching condition is formulate...
Michael Ohme, Andreas Schierwagen
ASIACRYPT
1998
Springer
15 years 8 months ago
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers
Rijmen and Preneel recently proposed for the rst time a family of trapdoor block ciphers 8]. In this family of ciphers, a trapdoor is hidden in S-boxes and is claimed to be undetec...
Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
CARDIS
1998
Springer
109views Hardware» more  CARDIS 1998»
15 years 8 months ago
The Vault, an Architecture for Smartcards to Gain Infinite Memory
Smartcard chips vendors have always done their best to embed more memory inside cards. These efforts are driven to allow their customers smartcard manufacturers - to mask more soft...
Patrick Biget
CORR
1998
Springer
98views Education» more  CORR 1998»
15 years 4 months ago
Bayesian Stratified Sampling to Assess Corpus Utility
This paper describes a method for asking statistical questions about a large text corpus. We exemplify the method by addressing the question, "What percentage of Federal Regi...
Judith Hochberg, Clint Scovel, Timothy Thomas, Sam...