Sciweavers

78 search results - page 16 / 16
» Forward-Secure Threshold Signature Schemes
Sort
View
CIBCB
2009
IEEE
13 years 2 months ago
Shape modeling and clustering of white matter fiber tracts using fourier descriptors
Reliable shape modeling and clustering of white matter fiber tracts is essential for clinical and anatomical studies that use diffusion tensor imaging (DTI) tractography techniques...
Xuwei Liang, Qi Zhuang, Ning Cao, Jun Zhang
SPW
2004
Springer
13 years 10 months ago
The Dancing Bear: A New Way of Composing Ciphers
This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block c...
Ross Anderson
ACSAC
2003
IEEE
13 years 8 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...