Sciweavers

ICDS
2010
IEEE
13 years 11 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
ICDS
2010
IEEE
13 years 11 months ago
Implementing an ITIL-Based IT Service Management Measurement System
Antti Lahtela, Marko Jäntti, Jukka Kaukola
WG
2010
Springer
13 years 3 months ago
max-cut and Containment Relations in Graphs
book Author Title 58 Bijo S Anand Atoms and clique separators in graph products 59 Asir T Domination in total graph of a commutative ring 60 Sharada B On the Neighbourhood Subdivi...
Marcin Kaminski
STACS
2010
Springer
13 years 12 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern
Theoretical Computer Science
Top of PageReset Settings