Sciweavers

468 search results - page 40 / 94
» Symmetric majority rules
Sort
View
ICNS
2009
IEEE
15 years 4 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
ISBI
2007
IEEE
15 years 4 months ago
Postprocessing of Brain White Matter Fiber Orientation Distribution Functions
By acquiring high angular resolution diffusion weighted magnetic resonance images (HARDI), Q-Ball analysis can disclose the 3D organization of fibrous tissue such as the brain whi...
Steven Delputte, Hans Dierckx, Els Fieremans, Yves...
KIVS
2007
Springer
15 years 4 months ago
Key Exchange for Service Discovery in Secure Content Addressable Sensor Networks
Abstract. Secure Content Addressable Network (SCAN) is an architecture for service discovery in service centric sensor networks that enables dynamic service composition. This paper...
Hans-Joachim Hof, Ingmar Baumgart, Martina Zitterb...
VISUALIZATION
2005
IEEE
15 years 3 months ago
Visualization of White Matter Tracts with Wrapped Streamlines
Diffusion tensor imaging is a magnetic resonance imaging method which has gained increasing importance in neuroscience and especially in neurosurgery. It acquires diffusion proper...
Frank Enders, Natascha Sauber, Dorit Merhof, Peter...
EUROCRYPT
2005
Springer
15 years 3 months ago
Computational Indistinguishability Between Quantum States and Its Cryptographic Application
We introduce a computational problem of distinguishing between two specific quantum states as a new cryptographic problem to design a quantum cryptographic scheme that is “secu...
Akinori Kawachi, Takeshi Koshiba, Harumichi Nishim...