Sciweavers

7 search results - page 1 / 2
» ecce 2011
Sort
View
IJNSEC
2011
239views more  IJNSEC 2011»
12 years 11 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
IJNSEC
2011
106views more  IJNSEC 2011»
12 years 11 months ago
Elliptic Curve Cryptosystems and Side-channel Attacks
In this paper, we present a background on elliptic curve cryptosystems (ECCs) along with the different methods used to compute the scalar multiplication (ECSM), which is the core...
Ekambaram Kesavulu Reddy
DAGM
2011
Springer
12 years 4 months ago
Visual Motion Capturing for Kinematic Model Estimation of a Humanoid Robot
Controlling a tendon-driven robot like the humanoid Ecce is a difficult task, even more so when its kinematics and its pose are not known precisely. In this paper, we present a vis...
Andre Gaschler
VTS
2011
IEEE
278views Hardware» more  VTS 2011»
12 years 8 months ago
Designing a fast and adaptive error correction scheme for increasing the lifetime of phase change memories
This paper proposes an adaptive multi-bit error correcting code for phase change memories that provides a manifold increase in the lifetime of phase change memories thereby making...
Rudrajit Datta, Nur A. Touba
ICASSP
2011
IEEE
12 years 8 months ago
A 3-layer coding scheme for biometry template protection based on spectral minutiae
—Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but ...
Xiaoying Shao, Haiyun Xu, Raymond N. J. Veldhuis, ...