|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3636 occurrences of 1668 keywords
|
|
|
Results
Found 8730 publication records. Showing 8730 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Michel Abdalla, Leonid Reyzin |
A New Forward-Secure Digital Signature Scheme. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
proven security, digital signatures, forward security, concrete security |
17 | T. K. Mitre, Adriano B. Huguet, Arnaldo de Albuquerque Araújo, N. S. Andrade |
An Object-Relational Database Containing Multimedia Data. |
SIBGRAPI |
2000 |
DBLP DOI BibTeX RDF |
criminal expert reports, multimedia data management, multimedia data storage, security techniques, cryptography, information system, digital signatures, database management system, digital watermarking, multimedia databases, multimedia database, object-relational database |
17 | Christian Cachin, Klaus Kursawe, Victor Shoup |
Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). |
PODC |
2000 |
DBLP DOI BibTeX RDF |
asynchronous consensus, crytographic common coin, dual-threshold schemes, Byzantine faults, threshold signatures |
17 | Hans-Arno Jacobsen, Bernd J. Krämer |
Modeling Interface Definition Language Extensions. |
TOOLS (37) |
2000 |
DBLP DOI BibTeX RDF |
interface definition language extensions, module names, interface names, operation signatures, pre-conditions, post-conditions, service quality annotations, real-time annotations, combined modeling language, CORBA middleware platform, semantic aspects specification, XML document type definitions, Extensible Style Language, quality of service, Extensible Markup Language, specification languages, invariants, synchronisation, client-server systems, subroutines, distributed object management, XSL, OMG, hypermedia markup languages, synchronization constraints |
17 | Ari Juels |
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
blind digital signatures, coin tracing, trustee-based coin tracing, anonymity, e-cash, digital cash |
17 | Octavian Ureche, Réjean Plamondon |
Document Transport, Transfer, and Exchange: Security and Commercial Aspects. |
ICDAR |
1999 |
DBLP DOI BibTeX RDF |
Document exchange, electronic transactions, mixed transfers, customized transactions, data security using handwritten signatures, digital cash |
17 | Gerrit Bleumer |
Biometric yet Privacy Protecting Person Authentication. |
Information Hiding |
1998 |
DBLP DOI BibTeX RDF |
Non-transferable certificates, Wallets-with-observer, Biometric person authentication, Blind Signatures, Interactive proofs |
17 | William Aiello, Sachin Lodha, Rafail Ostrovsky |
Fast Digital Identity Revocation (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
signatures, public-key infrastructure, certificate revocation, digital identities, Certificate authority |
17 | Zhiqian Wang, Jezekiel Ben-Arie |
SVD and log-log frequency sampling with Gabor kernels for invariant pictorial recognition. |
ICIP (3) |
1997 |
DBLP DOI BibTeX RDF |
log-log frequency sampling, Gabor kernels, invariant pictorial recognition, affine-invariant object recognition, signature recognition, sampling configuration, affine transform decomposition, slant, 2D translation, affine invariant spectral signatures, Cartesian logarithmic-logarithmic configuration, image patches, planar object surfaces, global Fourier transform, local Gabor transform, local representation, 3D pose information, singular value decomposition, singular value decomposition, SVD, scale, frequency domain, tilt, swing, multi-dimensional indexing |
17 | Jian-Cheng Dai, Gwo-Dong Chen, Chen-Chung Liu, Baw-Jhiune Liu |
A temporal behavioral object model for object-oriented databases. |
COMPSAC |
1997 |
DBLP DOI BibTeX RDF |
temporal behavioral object model, data history management, data value changes, DSS debugging systems, DSS maintenance systems, database debugging systems, database maintenance systems, method signatures, method invocation network, subtype object substitutability enforcement, class inheritance hierarchy, database application developers, event effect querying, decision support system, policies, finite state machines, object-oriented databases, object-oriented databases, type system, temporal databases, users, procedures, data objects, decision makers |
17 | Philippe Burlina, Bruce Lin, Rama Chellappa |
On a spectral attentional mechanism. |
CVPR |
1996 |
DBLP DOI BibTeX RDF |
spectral attentional mechanism, spectral signatures, regular object configurations, global operator, frequency domain constraints, monitored objects, decision theoretic method, learning decision regions, aerial image interpretation tasks, vehicle formations, convoys, detected formations, edge detection, geometrical models, sensitivity analysis, sensitivity analysis, object detection, decision theory, context information |
17 | Andrew Zisserman, Joseph L. Mundy, David A. Forsyth, Jane Liu, Nic Pillow, Charlie Rothwell, Sven Utcke |
Class-Based Grouping in Perspective Images. |
ICCV |
1995 |
DBLP DOI BibTeX RDF |
perspective images, class-based grouping, individual object, 3D geometric class, image outline, image constraints, feature grouping, 3D invariant descriptions, symmetry axes, canonical coordinate frames, projective signatures, real cluttered scenes, grouping algorithms, rotationally symmetric surfaces, canal surfaces, feature extraction, computational geometry, object recognition, image recognition, image features, polyhedra, perspective projection, feature identification, complex scene, object recognition system |
16 | Xuxian Jiang, Xingquan Zhu 0001 |
vEye: behavioral footprinting for self-propagating worm detection and profiling. |
Knowl. Inf. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Behavioral footprinting, Network security, Information systems, Sequence alignment, Worm detection |
16 | Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert |
An Efficient and Scalable Quasi-Aggregate Signature Scheme Based on LFSR Sequences. |
IEEE Trans. Parallel Distributed Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Alisher Kholmatov, Berrin A. Yanikoglu |
SUSIG: an on-line signature database, associated protocols and benchmark results. |
Pattern Anal. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Database, Biometrics, On-line signature verification |
16 | Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda |
Extended electronic signature policies. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
extended business model, signature policy, e-commerce, public key infrastructure, electronic signature, ASN.1 |
16 | Randy Smith, Neelam Goyal, Justin Ormont, Karthikeyan Sankaralingam, Cristian Estan |
Evaluating GPUs for network packet signature matching. |
ISPASS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Ting Wang 0006, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu 0001 |
Learning, indexing, and diagnosing network faults. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
fault signature, online diagnosis, network topology |
16 | Murat Dundar, E. Daniel Hirleman, Arun K. Bhunia, J. Paul Robinson, Bartek Rajwa |
Learning with a non-exhaustive training dataset: a case study: detection of bacteria cultures using optical-scattering technology. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
bacteria detection, nonexhaustive learning, anomaly detection, novelty detection, bayes classifier |
16 | A. C. Ramachandra, K. Pavithra, K. Yashasvini, K. B. Raja, K. R. Venugopal 0001, Lalit M. Patnaik |
Offline signature authentication using cross-validated graph matching. |
Bangalore Compute Conf. |
2009 |
DBLP DOI BibTeX RDF |
complete matching, equal error rate, offline signature verification, biometrics, bipartite graph, cross-validation |
16 | Abdullah Muzahid, Darío Suárez Gracia, Shanxiang Qi, Josep Torrellas |
SigRace: signature-based data race detection. |
ISCA |
2009 |
DBLP DOI BibTeX RDF |
SigRace, concurrency defect, signature, timestamp, data race, happened-before |
16 | Fernando Alonso-Fernandez, Julian Fiérrez, Almudena Gilperez, Javier Galbally, Javier Ortega-Garcia |
Robustness of Signature Verification Systems to Imitators with Increasing Skills. |
ICDAR |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jan Schat |
Evaluation of the Iddq Signature in devices with Gauss-distributed background current. |
DDECS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 |
Publicly Verifiable Privacy-Preserving Group Decryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography |
16 | Wei Zhao, Changlu Lin, Dingfeng Ye |
Provably Secure Convertible Nominative Signature Scheme. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Nominative signature, Digital signature, Selectively, Universally, Convertible |
16 | Rosario Gennaro |
Faster and Shorter Password-Authenticated Key Exchange. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ralf Küsters, Max Tuengerthal |
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
simulation-based security, joint state, secure composition, cryptographic protocols |
16 | Huafei Zhu, Feng Bao 0001, Robert H. Deng |
Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Xiaojiang Du, Mohsen Guizani, Yang Xiao 0001, Hsiao-Hwa Chen |
Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ningning Liu, Yunhong Wang |
Template selection for on-line signature verification. |
ICPR |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Wei Zhao, Dingfeng Ye |
Modified Huang-Wang's Convertible Nominative Signature Scheme. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Abhijit Bose, Xin Hu 0001, Kang G. Shin, Taejoon Park |
Behavioral detection of malware on mobile handsets. |
MobiSys |
2008 |
DBLP DOI BibTeX RDF |
mobile handsets, security, machine learning, worm detection |
16 | Humberto J. Abdelnur, Radu State, Olivier Festor |
Advanced Network Fingerprinting. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Passive Fingerprinting, Structural syntax inference, Feature extraction |
16 | Xuanwu Zhou, Ping Wei 0005 |
Anonymous Proxy Authorization Signature Scheme with Forward Security. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Atsushi Koide, Raylin Tso, Eiji Okamoto |
Convertible Undeniable Partially Blind Signature from Bilinear Pairings. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Joon-Sung Yang, Nur A. Touba |
Expanding Trace Buffer Observation Window for In-System Silicon Debug through Selective Capture. |
VTS |
2008 |
DBLP DOI BibTeX RDF |
Trace Buffer Observation Window, Two-Dimensional (2-D) Compaction, Cycling Register, Silicon Debug, MISR |
16 | Guangyu Zhu, Yefeng Zheng 0001, David S. Doermann |
Signature-Based Document Image Retrieval. |
ECCV (3) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Paolo Atzeni, Giorgio Gianforme, Paolo Cappellari |
Reasoning on Data Models in Schema Translation. |
FoIKS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Susanta Nanda, Tzi-cker Chiueh |
Execution Trace-Driven Automated Attack Signature Generation. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Frédéric Massicotte, Yvan Labiche, Lionel C. Briand |
Toward Automatic Generation of Intrusion Detection Verification Rules. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Barath Raghavan, Saurabh Panjwani, Anton Mityagin |
Analysis of the SPV secure routing protocol: weaknesses and lessons. |
Comput. Commun. Rev. |
2007 |
DBLP DOI BibTeX RDF |
secure path vector, routing, BGP |
16 | Ran Gal, Ariel Shamir, Daniel Cohen-Or |
Pose-Oblivious Shape Signature. |
IEEE Trans. Vis. Comput. Graph. |
2007 |
DBLP DOI BibTeX RDF |
Shape-signature, pose-oblivious, shape-matching |
16 | Xiaohua Zhou, Xiaohua Hu 0001, Xiaodan Zhang |
Topic Signature Language Models for Ad hoc Retrieval. |
IEEE Trans. Knowl. Data Eng. |
2007 |
DBLP DOI BibTeX RDF |
Semantic Smoothing, Topic Signature, Multiword Phrase, Information Retrieval, Language Models, Concept |
16 | Min Cai, Kai Hwang 0001, Jianping Pan 0001, Christos Papadopoulos |
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
distributed aggregation tree, cardinality counting, Network security, distributed hash table, traffic measurement, Internet worms, signature generation, worm containment |
16 | Kai Hwang 0001, Min Cai, Ying Chen, Min Qin |
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
SNORT and Bro systems, Internet episodes, traffic data mining, Network security, anomaly detection, intrusion detection systems, false alarms, signature generation |
16 | Daoliang Tan, Shiqi Yu 0001, Kaiqi Huang, Tieniu Tan |
Walker Recognition Without Gait Cycle Estimation. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
cycle estimation, PCA, LDA, Gait recognition |
16 | Luke Yen, Jayaram Bobba, Michael R. Marty, Kevin E. Moore, Haris Volos 0001, Mark D. Hill, Michael M. Swift, David A. Wood 0001 |
LogTM-SE: Decoupling Hardware Transactional Memory from Caches. |
HPCA |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Yuhang Hu, Yaowen Yang, Lei Zhang, Yong Lu |
Identification of structural parameters based on PZT impedance using genetic algorithms. |
IEEE Congress on Evolutionary Computation |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic |
A low overhead hardware technique for software integrity and confidentiality. |
ICCD |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Guowen Li, Jia Yu 0005, Rupeng Li, Daxing Li |
Two Threshold Multisignature Schemes from Bilinear Pairings. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya |
AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed |
A Framework for an Adaptive Intrusion Detection System using Bayesian Network. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Hung-Chuan Lai, Shi-Jinn Horng, Yong-Yuan Chen, Pingzhi Fan, Yi Pan 0001 |
A New Concurrent Detection of Control Flow Errors Based on DCT Technique. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Mickaël Coustaty, Stéphanie Guillas, Muriel Visani, Karell Bertet, Jean-Marc Ogier |
On the Joint Use of a Structural Signature and a Galois Lattice Classifier for Symbol Recognition. |
GREC |
2007 |
DBLP DOI BibTeX RDF |
Structural signature, Hough transform, Concept lattice, Symbol recognition, Topological relation |
16 | Javed Ahmed Mahar, Mohammad Khalid Khan, Mumtaz Hussain Mahar |
Off-Line Signature Verification of Bank Cheque Having Different Background Colors. |
AICCSA |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Frederik Vanhaverbeke, Marc Moeneclaey |
Binary signature sets for increased user capacity on the downlink of cdma systems. |
IEEE Trans. Wirel. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | InSeon Yoo, Ulrich Ultes-Nitsche |
Non-signature based virus detection. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Aliza Amsellem, Octavian Soldea, Ehud Rivlin |
Function-Based Classification from 3D Data and Audio. |
IROS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Niloy J. Mitra, Leonidas J. Guibas, Joachim Giesen, Mark Pauly |
Probabilistic fingerprints for shapes. |
Symposium on Geometry Processing |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Mingchu Li, Hongyan Yao, Jianbo Ma |
Recovery Mechanism of Online Certification Chain in Grid Computing. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
Certifucate Chain, Double signature, Grid security, Proxy certificate |
16 | Keiko Nakata 0001, Jacques Garrigue |
Recursive modules for programming. |
ICFP |
2006 |
DBLP DOI BibTeX RDF |
applicative functors, the expression problem, type systems, type inference, recursive modules |
16 | Yi Liu, Hongbin Zha, Hong Qin 0001 |
The Generalized Shape Distributions for Shape Matching and Analysis. |
SMI |
2006 |
DBLP DOI BibTeX RDF |
Shape distributions, Vector quantization and spatial layouts, Spin images |
16 | Maria Paola Bonacina, Silvio Ghilardi, Enrica Nicolini, Silvio Ranise, Daniele Zucchelli |
Decidability and Undecidability Results for Nelson-Oppen and Rewrite-Based Decision Procedures. |
IJCAR |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Harish Srinivasan, Sargur N. Srihari, Matthew J. Beal |
Machine Learning for Signature Verification. |
ICVGIP |
2006 |
DBLP DOI BibTeX RDF |
forensic signature examination, digital document processing, machine learning, biometrics, signature verification |
16 | Ouiddad Labbani-Igbida, Cyril Charron, El Mustapha Mouaddib |
Extraction of Haar Integral Features on Omnidirectional Images: Application to Local and Global Localization. |
DAGM-Symposium |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Alain Wahl, Jean Hennebert, Andreas Humm, Rolf Ingold |
Generation and Evaluation of Brute-Force Signature Forgeries. |
MRCS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Nandakishore Ramaswamy, K. R. Rao 0001 |
Video authentication for H.264/AVC using digital signature standard and secure hash algorithm. |
NOSSDAV |
2006 |
DBLP DOI BibTeX RDF |
digital signature standard, secure hash, video authentication, H.264/AVC, multimedia security |
16 | Lisa Gralewski, Neill W. Campbell, Ian Penton-Voak |
Using a Tensor Framework for the Analysis of Facial Dynamics. |
FGR |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Xiaohua Zhou, Xiaohua Hu 0001, Xiaodan Zhang, Xia Lin, Il-Yeol Song |
Context-sensitive semantic smoothing for the language modeling approach to genomic IR. |
SIGIR |
2006 |
DBLP DOI BibTeX RDF |
concept pair, genomic information retrieval, semantic smoothing, topic signature, information retrieval, language models |
16 | Milton Roberto Heinen, Fernando Santos Osório |
Handwritten Signature Authentication using Artificial Neural Networks. |
IJCNN |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt |
A Subliminal-Free Variant of ECDSA. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
subliminal communication, digital signature, ECDSA |
16 | Ninghui Li, Wenliang Du, Dan Boneh |
Oblivious signature-based envelope. |
Distributed Comput. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Luciano Paschoal Gaspary, Ricardo Nabinger Sanchez, D. W. Antunes, Edgar Meneghetti |
A SNMP-based platform for distributed stateful intrusion detection in enterprise networks. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Jonathan Katz |
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). |
SIGACT News |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Chih-Hung Wang, Yan-Sheng Kuo |
An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
cryptography, elliptic curves, bilinear pairings, fair exchange, contract signing |
16 | Fabiano Baroni, Joaquín J. Torres, Pablo Varona |
Interacting Slow and Fast Dynamics in Precise Spiking-Bursting Neurons. |
IWINAC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Michail Vlachos, Zografoula Vagena, Philip S. Yu, Vassilis Athitsos |
Rotation invariant indexing of shapes and line drawings. |
CIKM |
2005 |
DBLP DOI BibTeX RDF |
image signature, metric tree, Hough Transform |
16 | Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller |
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala |
Motivations for a Theoretical Approach to WYSIWYS. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Marco Gori, Marco Maggini, Lorenzo Sarti |
The RW2 Algorithm for Exact Graph Matching. |
ICAPR (1) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Hong Wang, Yuqing Zhang, Dengguo Feng |
Short Threshold Signature Schemes Without Random Oracles. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Yijuan Shi, Gongliang Chen, Jianhua Li 0001 |
ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
bilinear parings, Key agreement, group key agreement, ID-based cryptography |
16 | Liang Cai, Xiaohu Yang 0001, Chun Chen |
Design and Implementation of a Server-Aided PKI Service (SaPKI. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Woo-Cheol Kim, Sanghyun Park 0003, Jung-Im Won, Sang-Wook Kim, Jeehee Yoon |
A DNA Index Structure Using Frequency and Position Information of Genetic Alphabet. |
PAKDD |
2005 |
DBLP DOI BibTeX RDF |
DNA database, exact match, wildcard match, k-mismatch, indexing |
16 | Bob Blakley 0001, G. R. Blakley |
All sail, no anchor II: Acceptable high-end PKI. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation |
16 | Ila Nigam, Ranjan K. Mallik |
A joint performance measure for the decorrelating multiuser detector. |
IEEE Trans. Wirel. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao |
A fast string-matching algorithm for network processor-based intrusion detection system. |
ACM Trans. Embed. Comput. Syst. |
2004 |
DBLP DOI BibTeX RDF |
network, Intrusion detection, pattern matching, processor |
16 | Apostol Natsev, Rajeev Rastogi, Kyuseok Shim |
WALRUS: A Similarity Retrieval Algorithm for Image Databases. |
IEEE Trans. Knowl. Data Eng. |
2004 |
DBLP DOI BibTeX RDF |
clustering, dynamic programming, Wavelets, content-based retrieval, region matching |
16 | Matthew J. M. Peacock, Iain B. Collings, Michael L. Honig |
Asymptotic analysis of LMMSE multiuser receivers for multi-signature multicarrier CDMA in Rayleigh fading. |
IEEE Trans. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Amit Sethi, David Renaudie, David J. Kriegman, Jean Ponce |
Curve and Surface Duals and the Recognition of Curved 3D Objects from their Silhouettes. |
Int. J. Comput. Vis. |
2004 |
DBLP DOI BibTeX RDF |
three-dimensional object recognition, pedal curves, invariants, duals |
16 | Bin Li 0053, Kuanquan Wang, David Zhang 0001 |
On-Line Signature Verification Based on PCA (Principal Component Analysis) and MCA (Minor Component Analysis). |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Shinichi Nagano, Tetsuo Hasegawa, Akihiko Ohsuga, Shinichi Honiden |
Dynamic Invocation Model of Web Services Using Subsumption Relations. |
ICWS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Laurent Bussard, Refik Molva, Yves Roudier |
History-Based Signature or How to Trust Anonymous Documents. |
iTrust |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup |
Anonymous Identification in Ad Hoc Groups. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Hewayda M. Lotfy, Adel Said Elmaghraby |
CoIRS: Cluster-Oriented Image Retrieval System. |
ICTAI |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Seungjoo Kim, Dongho Won |
Threshold Entrusted Undeniable Signature. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Entrusted undeniable signature, Undeniable signature, Threshold signature |
16 | Abhishek Singh 0001, Chintan Patel, Jim Plusquellic |
On-Chip Impulse Response Generation for Analog and Mixed-Signal Testing. |
ITC |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Hak-soo Yu, Hongjoong Shin, Ji Hwan (Paul) Chun, Jacob A. Abraham |
Performance Characterization of Mixed-Signal Circuits Using a Ternary Signal Representation. |
ITC |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Matthew Roughan, Subhabrata Sen, Oliver Spatscheck, Nick G. Duffield |
Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
class of service (CoS), statistical signature, quality of service (QoS), traffic classification |
|
|