Sciweavers

2795 search results - page 328 / 559
» Recommended or Not
Sort
View
101
Voted
JOC
2010
106views more  JOC 2010»
14 years 11 months ago
A Taxonomy of Pairing-Friendly Elliptic Curves
Elliptic curves with small embedding degree and large prime-order subgroup are key ingredients for implementing pairingbased cryptographic systems. Such “pairing-friendly” curv...
David Freeman, Michael Scott, Edlyn Teske
MKTSCI
2010
100views more  MKTSCI 2010»
14 years 11 months ago
A Model for Trade-Up and Change in Considered Brands
A common theme in the marketing literature is the acquisition and retention of customers as they trade-up from inexpensive, introductory offerings to those of higher quality. We e...
Greg M. Allenby, Mark J. Garratt, Peter E. Rossi
XPU
2010
Springer
14 years 11 months ago
Automated Acceptance Testing of High Capacity Network Gateway
In this paper we will explore how agile acceptance testing is applied in testing a high capacity network gateway. We will demonstrate how the organisation managed to grow agile acc...
Ran Nyman, Ismo Aro, Roland Wagner
112
Voted
ACISP
2010
Springer
14 years 10 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
BIOSIG
2010
143views Biometrics» more  BIOSIG 2010»
14 years 10 months ago
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets
: In this fingerprint verification approach, a fingerprint image is divided into equally sized cells and the pattern is represented by a substitute resulting in a feature vector of...
Jan Hirzel, Daniel Hartung, Christoph Busch