Sciweavers

3145 search results - page 31 / 629
» Key Improvements to XTR
Sort
View
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
15 years 2 months ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel
ISECS
2008
IEEE
15 years 4 months ago
Key Technology and System Design in Mobile Supply Chain Management
Mobile supply chain management is increasingly recognized as an area offering significant potential for generating improvements and creating competitive advantage to corporations....
Qi Yuan, Zhao Xiaokang, Zhang Qiong
ISMIR
2004
Springer
100views Music» more  ISMIR 2004»
15 years 3 months ago
Well-Tempered Spelling: A Key Invariant Pitch Spelling Algorithm
In this paper is described a data-driven algorithm for the functionally correct spelling of MIDI pitch values in terms of Western musical notation. Input is in the form of MIDI fi...
Josh Stoddard, Christopher Raphael, Paul E. Utgoff
PCM
2004
Springer
114views Multimedia» more  PCM 2004»
15 years 3 months ago
Key Techniques of Bit Rate Reduction for H.264 Streams
In previous techniques of bit rate reduction transcoding, reusing the mode of the input MB is widely adopted. However, directly re-using the mode of input MB will cause additional ...
Peng Zhang, Qingming Huang, Wen Gao
ICC
2009
IEEE
246views Communications» more  ICC 2009»
15 years 4 months ago
Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
—The difficulty of processing data in encrypted form has long been the barrier to the widespread use of encryption in data storage applications; improved security or privacy wou...
Aldar Chun-fai Chan