Sciweavers

3145 search results - page 35 / 629
» Key Improvements to XTR
Sort
View
ISMIR
2005
Springer
143views Music» more  ISMIR 2005»
15 years 3 months ago
Fuzzy Analysis in Pitch-Class Determination for Polyphonic Audio Key Finding
This paper presents a fuzzy analysis technique for pitch class determination that improves the accuracy of key finding from audio information. Errors in audio key finding, typical...
Ching-Hua Chuan, Elaine Chew
ISW
2004
Springer
15 years 3 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
PDCAT
2004
Springer
15 years 3 months ago
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an inc...
Agus Setiawan, David Adiutama, Julius Liman, Aksha...
JCM
2008
134views more  JCM 2008»
14 years 9 months ago
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network
Abstract-- Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly...
Li Xu, Jianwei Chen, Xiaoding Wang
TWC
2008
138views more  TWC 2008»
14 years 9 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng