Sciweavers

24 search results - page 2 / 5
» Generalized Aho-Corasick Algorithm for Signature Based Anti-...
Sort
View
PAMI
2006
99views more  PAMI 2006»
13 years 5 months ago
Symbolic Signatures for Deformable Shapes
Recognizing classes of objects from their shape is an unsolved problem in machine vision that entails the ability of a computer system to represent and generalize complex geometric...
Salvador Ruiz-Correa, Linda G. Shapiro, Marina Mei...
IMA
2009
Springer
152views Cryptology» more  IMA 2009»
14 years 14 days ago
Double-Exponentiation in Factor-4 Groups and Its Applications
In previous work we showed how to compress certain prime-order subgroups of the cyclotomic subgroups of orders 22m + 1 of the multiplicative groups of F∗ 24m by a factor of 4. We...
Koray Karabina
CIKM
2011
Springer
12 years 5 months ago
LogSig: generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Liang Tang, Tao Li, Chang-Shing Perng
PODC
2003
ACM
13 years 11 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
CCS
2008
ACM
13 years 8 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig