Sciweavers

TON
2010
139views more  TON 2010»
13 years 6 months ago
KISS: Stochastic Packet Inspection Classifier for UDP Traffic
Abstract--This paper proposes KISS, a novel Internet classification engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applicati...
Aleaandro Finamore, Marco Mellia, Michela Meo, Dar...
INTERSPEECH
2010
13 years 6 months ago
On the potential of glottal signatures for speaker recognition
Most of current speaker recognition systems are based on features extracted from the magnitude spectrum of speech. However the excitation signal produced by the glottis is expecte...
Thomas Drugman, Thierry Dutoit
ICFHR
2010
207views Biometrics» more  ICFHR 2010»
13 years 6 months ago
Forensic Signature Verification Competition 4NSigComp2010 - Detection of Simulated and Disguised Signatures
This competition scenario aims at a performance comparison of several automated systems for the task of signature verification. The systems have to rate the probability of authors...
Marcus Liwicki, C. Elisa van den Heuvel, Bryan Fou...
TCOM
2011
86views more  TCOM 2011»
13 years 6 months ago
New Bounds and Optimal Binary Signature Sets - Part I: Periodic Total Squared Correlation
—We derive new bounds on the periodic (cyclic) total squared correlation (PTSC) of binary antipodal signature sets for any number of signatures K and any signature length L. Opti...
Harish Ganapathy, Dimitrios A. Pados, George N. Ka...
CANS
2009
Springer
276views Cryptology» more  CANS 2009»
13 years 9 months ago
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
Group signatures allow users to anonymously sign messages in the name of a group. Membership revocation has always been a critical issue in such systems. In 2004, Boneh and Shacham...
Benoît Libert, Damien Vergnaud
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 9 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
ICIP
2010
IEEE
13 years 9 months ago
Comparison of local feature descriptors for mobile visual search
We evaluate the performance of MPEG-7 image signatures, Compressed Histogram of Gradients descriptor (CHoG) and Scale Invariant Feature Transform (SIFT) descriptors for mobile vis...
Vijay Chandrasekhar, David M. Chen, Andy Lin, Gabr...
TIFS
2010
186views more  TIFS 2010»
13 years 10 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
SCN
2010
Springer
147views Communications» more  SCN 2010»
13 years 10 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
RAID
2010
Springer
13 years 10 months ago
GrAVity: A Massively Parallel Antivirus Engine
Abstract. In the ongoing arms race against malware, antivirus software is at the forefront, as one of the most important defense tools in our arsenal. Antivirus software is flexib...
Giorgos Vasiliadis, Sotiris Ioannidis