Sciweavers

2572 search results - page 300 / 515
» codes 2008
Sort
View
157
Voted
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
15 years 4 months ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
IJES
2008
76views more  IJES 2008»
15 years 4 months ago
SoC multiprocessor debugging and synchronisation using generic dynamic-connect debugger frontends
: Current and future SoC designs will contain an increasing number of programmable units. To be able to tailor and debug these processors in their system context at the highest pos...
Andreas Wieferink, Tim Kogel, Olaf Zerres, Rainer ...
126
Voted
IJNSEC
2008
209views more  IJNSEC 2008»
15 years 4 months ago
Application-Specific Key Release Scheme from Biometrics
This paper outlines a novel biometric key release scheme to bind application-specific key from biometric data such that the key can be retrieved effectively by using DiscreteHashi...
Thian Song Ong, Andrew Teoh Beng Jin, David Chek L...
INFORMATICALT
2008
97views more  INFORMATICALT 2008»
15 years 4 months ago
On the Use of the Formant Features in the Dynamic Time Warping Based Recognition of Isolated Words
Abstract. A possibility to use the formant features (FF) in the user-dependent isolated word recognition has been investigated. The word recognition was performed using a dynamic t...
Antanas Lipeika, Joana Lipeikiene
JASIS
2008
75views more  JASIS 2008»
15 years 4 months ago
Patent classifications as indicators of intellectual organization
Using the 138,751 patents filed in 2006 under the Patent Cooperation Treaty, coclassification analysis is pursued on the basis of three- and four-digit codes in the International ...
Loet Leydesdorff