Sciweavers

6574 search results - page 85 / 1315
» Current Signatures: Application
Sort
View
107
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Constant-Size Commitments to Polynomials and Their Applications
We introduce and formally define polynomial commitment schemes, and provide two efficient constructions. A polynomial commitment scheme allows a committer to commit to a polynomial...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
CIDM
2007
IEEE
15 years 7 months ago
Application of Neural Networks for Data Modeling of Power Systems with Time Varying Nonlinear Loads
— Nowadays power distribution systems typically operate with nonsinusoidal voltages and currents. Harmonic currents from nonlinear loads propagate through the system and cause ha...
Joy Mazumdar, Ganesh K. Venayagamoorthy, Ronald G....
ICMCS
2007
IEEE
100views Multimedia» more  ICMCS 2007»
15 years 7 months ago
Sensor Forensics: Printers, Cameras and Scanners, They Never Lie
Forensic characterization of devices is important in many situations such as establishing the trust and verifying authenticity of data and the device that created it. Current fore...
Nitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chian...
FCCM
2004
IEEE
269views VLSI» more  FCCM 2004»
15 years 4 months ago
FPGA Based Network Intrusion Detection using Content Addressable Memories
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). Current software-based NIDS are too compute intensive and can not ...
Long Bu, John A. Chandy
114
Voted
ICISC
2000
102views Cryptology» more  ICISC 2000»
15 years 2 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson