Sciweavers

868 search results - page 26 / 174
» On Analog Signature Analysis
Sort
View
ICISC
2003
89views Cryptology» more  ICISC 2003»
14 years 11 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
BMCBI
2005
67views more  BMCBI 2005»
14 years 9 months ago
Sequence signature analysis of chromosome identity in three Drosophila species
Background: All eukaryotic organisms need to distinguish each of their chromosomes. A few protein complexes have been described that recognise entire, specific chromosomes, for in...
Per Stenberg, Fredrik Pettersson, Anja O. Saura, A...
74
Voted
CCS
2009
ACM
15 years 4 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
BIBM
2009
IEEE
172views Bioinformatics» more  BIBM 2009»
15 years 2 months ago
Identifying Gene Signatures from Cancer Progression Data Using Ordinal Analysis
—A comprehensive understanding of cancer progression may shed light on genetic and molecular mechanisms of oncogenesis, and it may provide much needed information for effective d...
Yoon Soo Pyon, Jing Li
DATE
2006
IEEE
72views Hardware» more  DATE 2006»
15 years 3 months ago
A design for failure analysis (DFFA) technique to ensure incorruptible signatures
Fast failure analysis is a key enabler in shortening the
Sandip Kundu