Sciweavers

178 search results - page 23 / 36
» Analysis of One Popular Group Signature Scheme
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 5 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
HPDC
2006
IEEE
15 years 5 months ago
Path Grammar Guided Trace Compression and Trace Approximation
Trace-driven simulation is an important technique used in the evaluation of computer architecture innovations. However using it for studying parallel computers and applications is...
Xiaofeng Gao, Allan Snavely, Larry Carter
BMCBI
2002
147views more  BMCBI 2002»
14 years 11 months ago
Expression profiling of human renal carcinomas with functional taxonomic analysis
Background: Molecular characterization has contributed to the understanding of the inception, progression, treatment and prognosis of cancer. Nucleic acid array-based technologies...
Michael A. Gieseg, Theresa Cody, Michael Z. Man, S...
ICDAR
2007
IEEE
15 years 6 months ago
K-Nearest Oracle for Dynamic Ensemble Selection
For handwritten pattern recognition, multiple classifier system has been shown to be useful in improving recognition rates. One of the most important issues to optimize a multipl...
Albert Hung-Ren Ko, Robert Sabourin, Alceu de Souz...
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
14 years 9 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...