Sciweavers

BIOSURVEILLANCE
2007
Springer
14 years 1 months ago
A Bayesian Biosurveillance Method That Models Unknown Outbreak Diseases
Algorithms for detecting anomalous events can be divided into those that are designed to detect specific diseases and those that are non-specific in what they detect. Specific dete...
Yanna Shen, Gregory F. Cooper
BIOSURVEILLANCE
2007
Springer
14 years 1 months ago
A Study into Detection of Bio-Events in Multiple Streams of Surveillance Data
Abstract. This paper reviews the results of a study into combining evidence from multiple streams of surveillance data in order to improve timeliness and specificity of detection ...
Josep Roure, Artur Dubrawski, Jeff Schneider
BIOSURVEILLANCE
2007
Springer
14 years 1 months ago
Assessing Seasonal Variation in Multisource Surveillance Data: Annual Harmonic Regression
A significant proportion of human diseases, spanning the gamut from viral respiratory disease to arthropod-borne macroparasitic infections of the blood, exhibit distinct and stable...
Eric Lofgren, Nina Fefferman, Meena Doshi, Elena N...
BIOSURVEILLANCE
2007
Springer
14 years 1 months ago
Detecting Conserved RNA Secondary Structures in Viral Genomes: The RADAR Approach
Abstract. Conserved regions, or motifs, present among RNA secondary structures serve as a useful indicator for predicting the functionality of the RNA molecules. Automated detectio...
Mugdha Khaladkar, Jason T. L. Wang
ACISP
2007
Springer
14 years 1 months ago
TCHo: A Hardware-Oriented Trapdoor Cipher
This paper improves the Finiasz-Vaudenay construction of TCHo, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple ...
Jean-Philippe Aumasson, Matthieu Finiasz, Willi Me...
ACISP
2007
Springer
14 years 1 months ago
An Analysis of the Hermes8 Stream Ciphers
Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In parti...
Steve Babbage, Carlos Cid, Norbert Pramstaller, H&...
ACISP
2007
Springer
14 years 1 months ago
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
We propose the first single sign-on system in which a user can access services using unlinkable digital pseudonyms that can all be revoked in case she abuses any one service. Our ...
Stefan Brands, Liesje Demuynck, Bart De Decker
ACISP
2007
Springer
14 years 1 months ago
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Cheng-Kang Chu, Wen-Guey Tzeng
ACISP
2007
Springer
14 years 1 months ago
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to ident...
Yongdong Wu, Feng Bao, Robert H. Deng
ACISP
2007
Springer
14 years 1 months ago
On Building Hash Functions from Multivariate Quadratic Equations
Recent advances in hash functions cryptanalysis provide a strong impetus to explore new designs. This paper describes a new hash function mq-hash that depends for its security on t...
Olivier Billet, Matthew J. B. Robshaw, Thomas Peyr...