The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for signatures with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1966-1983 (21) 1984-1985 (20) 1986-1987 (21) 1988-1989 (38) 1990 (20) 1991 (27) 1992 (37) 1993 (29) 1994 (43) 1995 (41) 1996 (78) 1997 (77) 1998 (89) 1999 (136) 2000 (133) 2001 (189) 2002 (219) 2003 (267) 2004 (341) 2005 (456) 2006 (479) 2007 (521) 2008 (485) 2009 (435) 2010 (265) 2011 (288) 2012 (267) 2013 (272) 2014 (283) 2015 (278) 2016 (264) 2017 (300) 2018 (350) 2019 (322) 2020 (348) 2021 (397) 2022 (360) 2023 (424) 2024 (110)
Publication types (Num. hits)
article(3424) book(7) data(2) incollection(51) inproceedings(5164) phdthesis(76) proceedings(6)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3636 occurrences of 1668 keywords

Results
Found 8730 publication records. Showing 8730 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Michel Abdalla, Leonid Reyzin A New Forward-Secure Digital Signature Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF proven security, digital signatures, forward security, concrete security
17T. K. Mitre, Adriano B. Huguet, Arnaldo de Albuquerque Araújo, N. S. Andrade An Object-Relational Database Containing Multimedia Data. Search on Bibsonomy SIBGRAPI The full citation details ... 2000 DBLP  DOI  BibTeX  RDF criminal expert reports, multimedia data management, multimedia data storage, security techniques, cryptography, information system, digital signatures, database management system, digital watermarking, multimedia databases, multimedia database, object-relational database
17Christian Cachin, Klaus Kursawe, Victor Shoup Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). Search on Bibsonomy PODC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF asynchronous consensus, crytographic common coin, dual-threshold schemes, Byzantine faults, threshold signatures
17Hans-Arno Jacobsen, Bernd J. Krämer Modeling Interface Definition Language Extensions. Search on Bibsonomy TOOLS (37) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF interface definition language extensions, module names, interface names, operation signatures, pre-conditions, post-conditions, service quality annotations, real-time annotations, combined modeling language, CORBA middleware platform, semantic aspects specification, XML document type definitions, Extensible Style Language, quality of service, Extensible Markup Language, specification languages, invariants, synchronisation, client-server systems, subroutines, distributed object management, XSL, OMG, hypermedia markup languages, synchronization constraints
17Ari Juels Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF blind digital signatures, coin tracing, trustee-based coin tracing, anonymity, e-cash, digital cash
17Octavian Ureche, Réjean Plamondon Document Transport, Transfer, and Exchange: Security and Commercial Aspects. Search on Bibsonomy ICDAR The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Document exchange, electronic transactions, mixed transfers, customized transactions, data security using handwritten signatures, digital cash
17Gerrit Bleumer Biometric yet Privacy Protecting Person Authentication. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Non-transferable certificates, Wallets-with-observer, Biometric person authentication, Blind Signatures, Interactive proofs
17William Aiello, Sachin Lodha, Rafail Ostrovsky Fast Digital Identity Revocation (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF signatures, public-key infrastructure, certificate revocation, digital identities, Certificate authority
17Zhiqian Wang, Jezekiel Ben-Arie SVD and log-log frequency sampling with Gabor kernels for invariant pictorial recognition. Search on Bibsonomy ICIP (3) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF log-log frequency sampling, Gabor kernels, invariant pictorial recognition, affine-invariant object recognition, signature recognition, sampling configuration, affine transform decomposition, slant, 2D translation, affine invariant spectral signatures, Cartesian logarithmic-logarithmic configuration, image patches, planar object surfaces, global Fourier transform, local Gabor transform, local representation, 3D pose information, singular value decomposition, singular value decomposition, SVD, scale, frequency domain, tilt, swing, multi-dimensional indexing
17Jian-Cheng Dai, Gwo-Dong Chen, Chen-Chung Liu, Baw-Jhiune Liu A temporal behavioral object model for object-oriented databases. Search on Bibsonomy COMPSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF temporal behavioral object model, data history management, data value changes, DSS debugging systems, DSS maintenance systems, database debugging systems, database maintenance systems, method signatures, method invocation network, subtype object substitutability enforcement, class inheritance hierarchy, database application developers, event effect querying, decision support system, policies, finite state machines, object-oriented databases, object-oriented databases, type system, temporal databases, users, procedures, data objects, decision makers
17Philippe Burlina, Bruce Lin, Rama Chellappa On a spectral attentional mechanism. Search on Bibsonomy CVPR The full citation details ... 1996 DBLP  DOI  BibTeX  RDF spectral attentional mechanism, spectral signatures, regular object configurations, global operator, frequency domain constraints, monitored objects, decision theoretic method, learning decision regions, aerial image interpretation tasks, vehicle formations, convoys, detected formations, edge detection, geometrical models, sensitivity analysis, sensitivity analysis, object detection, decision theory, context information
17Andrew Zisserman, Joseph L. Mundy, David A. Forsyth, Jane Liu, Nic Pillow, Charlie Rothwell, Sven Utcke Class-Based Grouping in Perspective Images. Search on Bibsonomy ICCV The full citation details ... 1995 DBLP  DOI  BibTeX  RDF perspective images, class-based grouping, individual object, 3D geometric class, image outline, image constraints, feature grouping, 3D invariant descriptions, symmetry axes, canonical coordinate frames, projective signatures, real cluttered scenes, grouping algorithms, rotationally symmetric surfaces, canal surfaces, feature extraction, computational geometry, object recognition, image recognition, image features, polyhedra, perspective projection, feature identification, complex scene, object recognition system
16Xuxian Jiang, Xingquan Zhu 0001 vEye: behavioral footprinting for self-propagating worm detection and profiling. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Behavioral footprinting, Network security, Information systems, Sequence alignment, Worm detection
16Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert An Efficient and Scalable Quasi-Aggregate Signature Scheme Based on LFSR Sequences. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Alisher Kholmatov, Berrin A. Yanikoglu SUSIG: an on-line signature database, associated protocols and benchmark results. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Database, Biometrics, On-line signature verification
16Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda Extended electronic signature policies. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF extended business model, signature policy, e-commerce, public key infrastructure, electronic signature, ASN.1
16Randy Smith, Neelam Goyal, Justin Ormont, Karthikeyan Sankaralingam, Cristian Estan Evaluating GPUs for network packet signature matching. Search on Bibsonomy ISPASS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Ting Wang 0006, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu 0001 Learning, indexing, and diagnosing network faults. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fault signature, online diagnosis, network topology
16Murat Dundar, E. Daniel Hirleman, Arun K. Bhunia, J. Paul Robinson, Bartek Rajwa Learning with a non-exhaustive training dataset: a case study: detection of bacteria cultures using optical-scattering technology. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bacteria detection, nonexhaustive learning, anomaly detection, novelty detection, bayes classifier
16A. C. Ramachandra, K. Pavithra, K. Yashasvini, K. B. Raja, K. R. Venugopal 0001, Lalit M. Patnaik Offline signature authentication using cross-validated graph matching. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF complete matching, equal error rate, offline signature verification, biometrics, bipartite graph, cross-validation
16Abdullah Muzahid, Darío Suárez Gracia, Shanxiang Qi, Josep Torrellas SigRace: signature-based data race detection. Search on Bibsonomy ISCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SigRace, concurrency defect, signature, timestamp, data race, happened-before
16Fernando Alonso-Fernandez, Julian Fiérrez, Almudena Gilperez, Javier Galbally, Javier Ortega-Garcia Robustness of Signature Verification Systems to Imitators with Increasing Skills. Search on Bibsonomy ICDAR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jan Schat Evaluation of the Iddq Signature in devices with Gauss-distributed background current. Search on Bibsonomy DDECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 Publicly Verifiable Privacy-Preserving Group Decryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography
16Wei Zhao, Changlu Lin, Dingfeng Ye Provably Secure Convertible Nominative Signature Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Nominative signature, Digital signature, Selectively, Universally, Convertible
16Rosario Gennaro Faster and Shorter Password-Authenticated Key Exchange. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Ralf Küsters, Max Tuengerthal Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF simulation-based security, joint state, secure composition, cryptographic protocols
16Huafei Zhu, Feng Bao 0001, Robert H. Deng Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Xiaojiang Du, Mohsen Guizani, Yang Xiao 0001, Hsiao-Hwa Chen Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Ningning Liu, Yunhong Wang Template selection for on-line signature verification. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Wei Zhao, Dingfeng Ye Modified Huang-Wang's Convertible Nominative Signature Scheme. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Abhijit Bose, Xin Hu 0001, Kang G. Shin, Taejoon Park Behavioral detection of malware on mobile handsets. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile handsets, security, machine learning, worm detection
16Humberto J. Abdelnur, Radu State, Olivier Festor Advanced Network Fingerprinting. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Passive Fingerprinting, Structural syntax inference, Feature extraction
16Xuanwu Zhou, Ping Wei 0005 Anonymous Proxy Authorization Signature Scheme with Forward Security. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Atsushi Koide, Raylin Tso, Eiji Okamoto Convertible Undeniable Partially Blind Signature from Bilinear Pairings. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Joon-Sung Yang, Nur A. Touba Expanding Trace Buffer Observation Window for In-System Silicon Debug through Selective Capture. Search on Bibsonomy VTS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trace Buffer Observation Window, Two-Dimensional (2-D) Compaction, Cycling Register, Silicon Debug, MISR
16Guangyu Zhu, Yefeng Zheng 0001, David S. Doermann Signature-Based Document Image Retrieval. Search on Bibsonomy ECCV (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Paolo Atzeni, Giorgio Gianforme, Paolo Cappellari Reasoning on Data Models in Schema Translation. Search on Bibsonomy FoIKS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Susanta Nanda, Tzi-cker Chiueh Execution Trace-Driven Automated Attack Signature Generation. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Frédéric Massicotte, Yvan Labiche, Lionel C. Briand Toward Automatic Generation of Intrusion Detection Verification Rules. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Barath Raghavan, Saurabh Panjwani, Anton Mityagin Analysis of the SPV secure routing protocol: weaknesses and lessons. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure path vector, routing, BGP
16Ran Gal, Ariel Shamir, Daniel Cohen-Or Pose-Oblivious Shape Signature. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Shape-signature, pose-oblivious, shape-matching
16Xiaohua Zhou, Xiaohua Hu 0001, Xiaodan Zhang Topic Signature Language Models for Ad hoc Retrieval. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Semantic Smoothing, Topic Signature, Multiword Phrase, Information Retrieval, Language Models, Concept
16Min Cai, Kai Hwang 0001, Jianping Pan 0001, Christos Papadopoulos WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed aggregation tree, cardinality counting, Network security, distributed hash table, traffic measurement, Internet worms, signature generation, worm containment
16Kai Hwang 0001, Min Cai, Ying Chen, Min Qin Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SNORT and Bro systems, Internet episodes, traffic data mining, Network security, anomaly detection, intrusion detection systems, false alarms, signature generation
16Daoliang Tan, Shiqi Yu 0001, Kaiqi Huang, Tieniu Tan Walker Recognition Without Gait Cycle Estimation. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cycle estimation, PCA, LDA, Gait recognition
16Luke Yen, Jayaram Bobba, Michael R. Marty, Kevin E. Moore, Haris Volos 0001, Mark D. Hill, Michael M. Swift, David A. Wood 0001 LogTM-SE: Decoupling Hardware Transactional Memory from Caches. Search on Bibsonomy HPCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yuhang Hu, Yaowen Yang, Lei Zhang, Yong Lu Identification of structural parameters based on PZT impedance using genetic algorithms. Search on Bibsonomy IEEE Congress on Evolutionary Computation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic A low overhead hardware technique for software integrity and confidentiality. Search on Bibsonomy ICCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Guowen Li, Jia Yu 0005, Rupeng Li, Daxing Li Two Threshold Multisignature Schemes from Bilinear Pairings. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed A Framework for an Adaptive Intrusion Detection System using Bayesian Network. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Hung-Chuan Lai, Shi-Jinn Horng, Yong-Yuan Chen, Pingzhi Fan, Yi Pan 0001 A New Concurrent Detection of Control Flow Errors Based on DCT Technique. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Mickaël Coustaty, Stéphanie Guillas, Muriel Visani, Karell Bertet, Jean-Marc Ogier On the Joint Use of a Structural Signature and a Galois Lattice Classifier for Symbol Recognition. Search on Bibsonomy GREC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Structural signature, Hough transform, Concept lattice, Symbol recognition, Topological relation
16Javed Ahmed Mahar, Mohammad Khalid Khan, Mumtaz Hussain Mahar Off-Line Signature Verification of Bank Cheque Having Different Background Colors. Search on Bibsonomy AICCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Frederik Vanhaverbeke, Marc Moeneclaey Binary signature sets for increased user capacity on the downlink of cdma systems. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16InSeon Yoo, Ulrich Ultes-Nitsche Non-signature based virus detection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Aliza Amsellem, Octavian Soldea, Ehud Rivlin Function-Based Classification from 3D Data and Audio. Search on Bibsonomy IROS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Niloy J. Mitra, Leonidas J. Guibas, Joachim Giesen, Mark Pauly Probabilistic fingerprints for shapes. Search on Bibsonomy Symposium on Geometry Processing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Mingchu Li, Hongyan Yao, Jianbo Ma Recovery Mechanism of Online Certification Chain in Grid Computing. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Certifucate Chain, Double signature, Grid security, Proxy certificate
16Keiko Nakata 0001, Jacques Garrigue Recursive modules for programming. Search on Bibsonomy ICFP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF applicative functors, the expression problem, type systems, type inference, recursive modules
16Yi Liu, Hongbin Zha, Hong Qin 0001 The Generalized Shape Distributions for Shape Matching and Analysis. Search on Bibsonomy SMI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Shape distributions, Vector quantization and spatial layouts, Spin images
16Maria Paola Bonacina, Silvio Ghilardi, Enrica Nicolini, Silvio Ranise, Daniele Zucchelli Decidability and Undecidability Results for Nelson-Oppen and Rewrite-Based Decision Procedures. Search on Bibsonomy IJCAR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Harish Srinivasan, Sargur N. Srihari, Matthew J. Beal Machine Learning for Signature Verification. Search on Bibsonomy ICVGIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF forensic signature examination, digital document processing, machine learning, biometrics, signature verification
16Ouiddad Labbani-Igbida, Cyril Charron, El Mustapha Mouaddib Extraction of Haar Integral Features on Omnidirectional Images: Application to Local and Global Localization. Search on Bibsonomy DAGM-Symposium The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Alain Wahl, Jean Hennebert, Andreas Humm, Rolf Ingold Generation and Evaluation of Brute-Force Signature Forgeries. Search on Bibsonomy MRCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Nandakishore Ramaswamy, K. R. Rao 0001 Video authentication for H.264/AVC using digital signature standard and secure hash algorithm. Search on Bibsonomy NOSSDAV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital signature standard, secure hash, video authentication, H.264/AVC, multimedia security
16Lisa Gralewski, Neill W. Campbell, Ian Penton-Voak Using a Tensor Framework for the Analysis of Facial Dynamics. Search on Bibsonomy FGR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Xiaohua Zhou, Xiaohua Hu 0001, Xiaodan Zhang, Xia Lin, Il-Yeol Song Context-sensitive semantic smoothing for the language modeling approach to genomic IR. Search on Bibsonomy SIGIR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF concept pair, genomic information retrieval, semantic smoothing, topic signature, information retrieval, language models
16Milton Roberto Heinen, Fernando Santos Osório Handwritten Signature Authentication using Artificial Neural Networks. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt A Subliminal-Free Variant of ECDSA. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF subliminal communication, digital signature, ECDSA
16Ninghui Li, Wenliang Du, Dan Boneh Oblivious signature-based envelope. Search on Bibsonomy Distributed Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Luciano Paschoal Gaspary, Ricardo Nabinger Sanchez, D. W. Antunes, Edgar Meneghetti A SNMP-based platform for distributed stateful intrusion detection in enterprise networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Jonathan Katz Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). Search on Bibsonomy SIGACT News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Chih-Hung Wang, Yan-Sheng Kuo An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, elliptic curves, bilinear pairings, fair exchange, contract signing
16Fabiano Baroni, Joaquín J. Torres, Pablo Varona Interacting Slow and Fast Dynamics in Precise Spiking-Bursting Neurons. Search on Bibsonomy IWINAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Michail Vlachos, Zografoula Vagena, Philip S. Yu, Vassilis Athitsos Rotation invariant indexing of shapes and line drawings. Search on Bibsonomy CIKM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF image signature, metric tree, Hough Transform
16Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala Motivations for a Theoretical Approach to WYSIWYS. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Marco Gori, Marco Maggini, Lorenzo Sarti The RW2 Algorithm for Exact Graph Matching. Search on Bibsonomy ICAPR (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Hong Wang, Yuqing Zhang, Dengguo Feng Short Threshold Signature Schemes Without Random Oracles. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Yijuan Shi, Gongliang Chen, Jianhua Li 0001 ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear parings, Key agreement, group key agreement, ID-based cryptography
16Liang Cai, Xiaohu Yang 0001, Chun Chen Design and Implementation of a Server-Aided PKI Service (SaPKI. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Woo-Cheol Kim, Sanghyun Park 0003, Jung-Im Won, Sang-Wook Kim, Jeehee Yoon A DNA Index Structure Using Frequency and Position Information of Genetic Alphabet. Search on Bibsonomy PAKDD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF DNA database, exact match, wildcard match, k-mismatch, indexing
16Bob Blakley 0001, G. R. Blakley All sail, no anchor II: Acceptable high-end PKI. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation
16Ila Nigam, Ranjan K. Mallik A joint performance measure for the decorrelating multiuser detector. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao A fast string-matching algorithm for network processor-based intrusion detection system. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network, Intrusion detection, pattern matching, processor
16Apostol Natsev, Rajeev Rastogi, Kyuseok Shim WALRUS: A Similarity Retrieval Algorithm for Image Databases. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF clustering, dynamic programming, Wavelets, content-based retrieval, region matching
16Matthew J. M. Peacock, Iain B. Collings, Michael L. Honig Asymptotic analysis of LMMSE multiuser receivers for multi-signature multicarrier CDMA in Rayleigh fading. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Amit Sethi, David Renaudie, David J. Kriegman, Jean Ponce Curve and Surface Duals and the Recognition of Curved 3D Objects from their Silhouettes. Search on Bibsonomy Int. J. Comput. Vis. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF three-dimensional object recognition, pedal curves, invariants, duals
16Bin Li 0053, Kuanquan Wang, David Zhang 0001 On-Line Signature Verification Based on PCA (Principal Component Analysis) and MCA (Minor Component Analysis). Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Shinichi Nagano, Tetsuo Hasegawa, Akihiko Ohsuga, Shinichi Honiden Dynamic Invocation Model of Web Services Using Subsumption Relations. Search on Bibsonomy ICWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Laurent Bussard, Refik Molva, Yves Roudier History-Based Signature or How to Trust Anonymous Documents. Search on Bibsonomy iTrust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup Anonymous Identification in Ad Hoc Groups. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Hewayda M. Lotfy, Adel Said Elmaghraby CoIRS: Cluster-Oriented Image Retrieval System. Search on Bibsonomy ICTAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Seungjoo Kim, Dongho Won Threshold Entrusted Undeniable Signature. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Entrusted undeniable signature, Undeniable signature, Threshold signature
16Abhishek Singh 0001, Chintan Patel, Jim Plusquellic On-Chip Impulse Response Generation for Analog and Mixed-Signal Testing. Search on Bibsonomy ITC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Hak-soo Yu, Hongjoong Shin, Ji Hwan (Paul) Chun, Jacob A. Abraham Performance Characterization of Mixed-Signal Circuits Using a Ternary Signal Representation. Search on Bibsonomy ITC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Matthew Roughan, Subhabrata Sen, Oliver Spatscheck, Nick G. Duffield Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF class of service (CoS), statistical signature, quality of service (QoS), traffic classification
Displaying result #801 - #900 of 8730 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license