Sciweavers

6574 search results - page 71 / 1315
» Current Signatures: Application
Sort
View
84
Voted
ASIACRYPT
2003
Springer
15 years 6 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...
146
Voted
BMCBI
2011
14 years 4 months ago
Cell Subset Prediction for Blood Genomic Studies
Background: Genome-wide transcriptional profiling of patient blood samples offers a powerful tool to investigate underlying disease mechanisms and personalized treatment decisions...
Christopher R. Bolen, Mohamed Uduman, Steven H. Kl...
107
Voted
ICIP
1997
IEEE
16 years 2 months ago
Using the Fourier Slice Theorem for Representation of Object Views and Models with application to Face Recognition
A novel method unifying viewer and model centered approaches for representing structurally complex 3-D objects like human faces is presented. The uni ed 3D frequency-domain repres...
Dibyendu Nandy, Jezekiel Ben-Arie
78
Voted
IMA
2009
Springer
152views Cryptology» more  IMA 2009»
15 years 7 months ago
Double-Exponentiation in Factor-4 Groups and Its Applications
In previous work we showed how to compress certain prime-order subgroups of the cyclotomic subgroups of orders 22m + 1 of the multiplicative groups of F∗ 24m by a factor of 4. We...
Koray Karabina
EUROPKI
2007
Springer
15 years 6 months ago
Applicability of Public Key Infrastructures in Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSNâ€...
Rodrigo Roman, Cristina Alcaraz