Sciweavers

359 search results - page 31 / 72
» Supporting Real World Security Models in Java
Sort
View
127
Voted
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 8 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
TITB
2008
204views more  TITB 2008»
15 years 2 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
145
Voted
ESANN
2004
15 years 4 months ago
Self-organizing context learning
This work is designed to contribute to a deeper understanding of the recently proposed Merging SOM (MSOM). Its context model aims at the representation of sequences, an important s...
Marc Strickert, Barbara Hammer
ICIP
2009
IEEE
16 years 3 months ago
Age Regression From Faces Using Random Forests
Predicting the age of a person through face image analysis holds the potential to drive an extensive array of real world applications from human computer interaction and security ...
121
Voted
CORR
2010
Springer
208views Education» more  CORR 2010»
15 years 2 months ago
MapReduce for Integer Factorization
Abstract. Integer factorization is a very hard computational problem. Currently no ecient algorithm for integer factorization is publicly known. However, this is an important probl...
Javier Tordable