Sciweavers

262 search results - page 42 / 53
» Proposal of a Signature Scheme Based on STS Trapdoor
Sort
View
AINA
2006
IEEE
15 years 3 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick
IPPS
2006
IEEE
15 years 3 months ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner
ICAPR
2009
Springer
15 years 4 months ago
Color Image Retrieval Using M-Band Wavelet Transform Based Color-Texture Feature
—Feature Extraction algorithm is a very important component of any retrieval scheme. We propose M-band Wavelet Transform based feature extraction algorithm in this paper. The MxM...
Malay Kumar Kundu, Priyank Bagrecha
EDCC
1999
Springer
15 years 1 months ago
Transparent Word-Oriented Memory BIST Based on Symmetric March Algorithms
Abstract. The paper presents a new approach to transparent BIST for wordoriented RAMs which is based on the transformation of March transparent test algorithms to the symmetric ver...
Vyacheslav N. Yarmolik, I. V. Bykov, Sybille Helle...
ICDAR
2007
IEEE
15 years 3 months ago
Curvelets Based Queries for CBIR Application in Handwriting Collections
This paper presents a new use of the Curvelet transform as a multiscale method for indexing linear singularities and curved handwritten shapes in documents images. As it belongs t...
Guillaume Joutel, Véronique Eglin, St&eacut...