Sciweavers

2131 search results - page 69 / 427
» Immunity for Closed Sets
Sort
View
87
Voted
ESORICS
2008
Springer
15 years 2 months ago
Improved Security Notions and Protocols for Non-transferable Identification
Abstract. Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play "man-in-the-...
Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadegh...
104
Voted
CCS
2010
ACM
15 years 1 months ago
A new framework for efficient password-based authenticated key exchange
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The...
Adam Groce, Jonathan Katz
92
Voted
CORR
2010
Springer
220views Education» more  CORR 2010»
15 years 27 days ago
Multichannel Sampling of Pulse Streams at the Rate of Innovation
We consider minimal-rate sampling schemes for streams of delayed and weighted versions of a known pulse shape. Such signals belong to the class of finite rate of innovation (FRI) m...
Kfir Gedalyahu, Ronen Tur, Yonina C. Eldar
85
Voted
CORR
2010
Springer
85views Education» more  CORR 2010»
15 years 26 days ago
The Motif Tracking Algorithm
: The search for patterns or motifs in data represents a problem area of key interest to finance and economic researchers. In this paper we introduce the Motif Tracking Algorithm, ...
William O. Wilson, Phil Birkin, Uwe Aickelin
125
Voted
BMCBI
2006
126views more  BMCBI 2006»
15 years 25 days ago
A minimally invasive multiple marker approach allows highly efficient detection of meningioma tumors
Background: The development of effective frameworks that permit an accurate diagnosis of tumors, especially in their early stages, remains a grand challenge in the field of bioinf...
Andreas Keller, Nicole Ludwig, Nicole Comtesse, An...