Sciweavers

693 search results - page 85 / 139
» Consistent normal interpolation
Sort
View
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
ICPR
2008
IEEE
15 years 8 months ago
Image analysis approach for identification of renal transplant rejection
Acute renal rejection is the most common reason for graft (transplanted kidney) failure after kidney transplantation, and early detection is crucial to survival of function in the...
Ayman El-Baz, Georgy L. Gimel'farb, Mohamed Abou E...
PIMRC
2008
IEEE
15 years 8 months ago
Joint turbo channel estimation and data recovery in fast fading mobile coded OFDM
Orthogonal frequency division multiplexing (OFDM) system suffers extra performance degradation in fast fading channel due to intercarrier interference (ICI). Combing frequency dom...
Daniel N. Liu, Michael P. Fitz
SIGCOMM
2006
ACM
15 years 8 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
CAMP
2005
IEEE
15 years 7 months ago
Speeding-up NCC-Based Template Matching Using Parallel Multimedia Instructions
— This paper describes the mapping of a recently introduced template matching algorithm based on the Normalized Cross Correlation (NCC) on a general purpose processor endowed wit...
Luigi di Stefano, Stefano Mattoccia, Federico Tomb...