Sciweavers

262 search results - page 35 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
112
Voted
ISI
2007
Springer
15 years 11 days ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
ICB
2009
Springer
355views Biometrics» more  ICB 2009»
15 years 7 months ago
3D Signatures for Fast 3D Face Recognition
We propose a vector representation (called a 3D signature) for 3D face shape in biometrics applications. Elements of the vector correspond to fixed surface points in a face-centere...
Chris Boehnen, Tanya Peters, Patrick J. Flynn
EUROCRYPT
1999
Springer
15 years 4 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
112
Voted
WISEC
2010
ACM
15 years 20 days ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ACCV
2010
Springer
14 years 7 months ago
Descriptor Learning Based on Fisher Separation Criterion for Texture Classification
Abstract. This paper proposes a novel method to deal with the representation issue in texture classification. A learning framework of image descriptor is designed based on the Fish...
Yimo Guo, Guoying Zhao, Matti Pietikäinen, Zh...