Sciweavers

787 search results - page 115 / 158
» Subversion-Resilient Signature Schemes
Sort
View
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
15 years 3 months ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart
ICBA
2004
Springer
144views Biometrics» more  ICBA 2004»
15 years 3 months ago
Improving Iris Recognition Accuracy via Cascaded Classifiers
As a reliable approach to human identification, iris recognition has received increasing attention in recent years. In the literature of iris recognition, local feature of image de...
Zhenan Sun, Yunhong Wang, Tieniu Tan, Jiali Cui
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
15 years 3 months ago
Signature-based Filtering Techniques for Structural Joins of XML Data
Queries on XML documents typically combine selections on element contents, and, via path expressions, the structural relationships between tagged elements. Efficient support for ...
Huan Huo, Guoren Wang, Chuan Yang, Rui Zhou
ICCSA
2005
Springer
15 years 3 months ago
M of N Features vs. Intrusion Detection
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Zhuowei Li, Amitabha Das
ASIACRYPT
2009
Springer
15 years 2 months ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal