Sciweavers

404 search results - page 16 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
ICB
2007
Springer
110views Biometrics» more  ICB 2007»
15 years 3 months ago
Comparison of Compression Algorithms' Impact on Iris Recognition Accuracy
The impact of using different lossy compression algorithms on the matching accuracy of iris recognition systems is investigated. In particular, we relate rate-distortion performan...
Stefan Matschitsch, Martin Tschinder, Andreas Uhl
EJWCN
2010
156views more  EJWCN 2010»
14 years 4 months ago
On Performance Modeling of Ad Hoc Routing Protocols
Simulation studies have been the predominant method of evaluating ad hoc routing algorithms. Despite their wide use and merits, simulations are generally time consuming. Furthermo...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
JCP
2007
127views more  JCP 2007»
14 years 9 months ago
Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem
Abstract— Side channel attacks such as Simple Power Analysis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms for elliptic curve point sc...
Andrew Byrne, Nicolas Meloni, Arnaud Tisserand, Em...
AGENTS
1998
Springer
15 years 1 months ago
A Synergy of Agent Components: Social Comparison for Failure Detection
of other components. This abstract presents an implemented illustration of such explicit component synergy and its usefulness in dynamic multi-agent environments. In such environme...
Gal A. Kaminka, Milind Tambe
SUTC
2006
IEEE
15 years 3 months ago
Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks
- In this paper, we describe a group key management protocol for hierarchical sensor networks where instead of using pre-deployed keys, each sensor node generates a partial key dyn...
Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bha...