Sciweavers

83 search results - page 16 / 17
» Generating Confusion Sets for Context-Sensitive Error Correc...
Sort
View
ASIACRYPT
2009
Springer
14 years 25 days ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
IH
1999
Springer
13 years 10 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak
BIOID
2008
149views Biometrics» more  BIOID 2008»
13 years 8 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
BMCBI
2008
158views more  BMCBI 2008»
13 years 6 months ago
LC-MSsim - a simulation software for liquid chromatography mass spectrometry data
Background: Mass Spectrometry coupled to Liquid Chromatography (LC-MS) is commonly used to analyze the protein content of biological samples in large scale studies. The data resul...
Ole Schulz-Trieglaff, Nico Pfeifer, Clemens Gr&oum...
COMCOM
2002
120views more  COMCOM 2002»
13 years 6 months ago
The Cyclone Server Architecture: streamlining delivery of popular content
Abstract-We propose a new webserver architecture optimized for delivery of large, popular files. Delivery of such files currently pose a scalability problem for conventional conten...
Stanislav Rost, John W. Byers, Azer Bestavros