Sciweavers

7 search results - page 1 / 2
» ecce 2011
Sort
View
IJNSEC
2011
239views more  IJNSEC 2011»
14 years 5 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
IJNSEC
2011
106views more  IJNSEC 2011»
14 years 5 months ago
Elliptic Curve Cryptosystems and Side-channel Attacks
In this paper, we present a background on elliptic curve cryptosystems (ECCs) along with the different methods used to compute the scalar multiplication (ECSM), which is the core...
Ekambaram Kesavulu Reddy
126
Voted
DAGM
2011
Springer
13 years 10 months ago
Visual Motion Capturing for Kinematic Model Estimation of a Humanoid Robot
Controlling a tendon-driven robot like the humanoid Ecce is a difficult task, even more so when its kinematics and its pose are not known precisely. In this paper, we present a vis...
Andre Gaschler
VTS
2011
IEEE
278views Hardware» more  VTS 2011»
14 years 1 months ago
Designing a fast and adaptive error correction scheme for increasing the lifetime of phase change memories
This paper proposes an adaptive multi-bit error correcting code for phase change memories that provides a manifold increase in the lifetime of phase change memories thereby making...
Rudrajit Datta, Nur A. Touba
97
Voted
ICASSP
2011
IEEE
14 years 1 months ago
A 3-layer coding scheme for biometry template protection based on spectral minutiae
—Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but ...
Xiaoying Shao, Haiyun Xu, Raymond N. J. Veldhuis, ...