Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Análisis firma")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 255

  • Page / 11
Export

Selection :

  • and

Security analysis of several group signature schemesGUILIN WANG.Lecture notes in computer science. 2003, pp 252-265, issn 0302-9743, isbn 3-540-20609-4, 14 p.Conference Paper

On the relation of errors and its syndrome in signature analysisCHAN, J. C.Microelectronics and reliability. 1992, Vol 32, Num 10, pp 1379-1383, issn 0026-2714Article

Efficient signature generation by smart cardsSCHNORR, C. P.Journal of cryptology. 1991, Vol 4, Num 3, pp 161-174, issn 0933-2790Article

Connections among several versions of one-way hash functionsZHENG, Y; MATSUMOTO, T; IMAI, H et al.Transactions of the Institute of Electronics and Communication Engineers of Japan. Section E. 1990, Vol 73, Num 7, pp 1092-1099, issn 0387-236XArticle

Infrared ship signature analysis and optimisationNEELE, Filip.Proceedings of SPIE, the International Society for Optical Engineering. 2005, pp 188-198, issn 0277-786X, isbn 0-8194-5796-5, 1Vol, 11 p.Conference Paper

Motion signature analysis for microwave detection systemsLESTER, Andrew J; SMITH, Clifton L.International Carnahan conference on security technology. 2002, pp 60-70, isbn 0-7803-7436-3, 11 p.Conference Paper

The security of two ID-based multisignature protocols for sequential and broadcasting architecturesLEE, N.-Y; HWANG, T; WANG, C.-H et al.Information processing letters. 1999, Vol 70, Num 2, pp 79-81, issn 0020-0190Article

Component-oriented algorithms for signature verificationDIMAURO, G; IMPEDOVO, S; PIRLO, G et al.International journal of pattern recognition and artificial intelligence. 1994, Vol 8, Num 3, pp 771-793, issn 0218-0014Article

SignatureTM bearings as used for tapered roller bearing design optimizationFRAYER, R. W; MILLER, J. R; WOJAN, S. A et al.SAE transactions. 1992, Vol 101, Num 2, pp 144-151, issn 0096-736XArticle

An a priori approach to the evaluation of signature analysis efficiencyCASPI, P; PIOTROWSKI, J; VELAZCO, R et al.IEEE transactions on computers. 1991, Vol 40, Num 9, pp 1068-1071, issn 0018-9340Article

ID-based authentication system for computer virus detectionOKAMOTO, E; MASUMOTO, H.Electronics Letters. 1990, Vol 26, Num 15, pp 1169-1170, issn 0013-5194Article

Method of characteristic signatures matching through discrepancy enhanced library generation processWANG, Shih-Chun; KU, Yi-Sha; KO, Chun-Hung et al.Proceedings of SPIE, the International Society for Optical Engineering. 2005, pp 59081D.1-59081D.11, issn 0277-786X, isbn 0-8194-5913-5, 1VolConference Paper

Perceptual analysis of handwritten signatures for biometric authenticationFAIRHURST, M. C; KAPLANI, E.IEE proceedings. Vision, image and signal processing. 2003, Vol 150, Num 6, pp 389-394, issn 1350-245X, 6 p.Article

Secure anonymous signature-based transactionsVAN HERREWEGHEN, Els.Lecture notes in computer science. 2000, pp 55-71, issn 0302-9743, isbn 3-540-41031-7Conference Paper

Automatic signature verification based on the wavelet descriptorZIJUN YANG; KUO, C.-C. J.SPIE proceedings series. 1998, pp 618-629, isbn 0-8194-2915-5Conference Paper

Optical fiber magnetic field sensors and signal processing for vehicle detection and classificationKOSTIC, I. A; HOLTON, C; CLAUS, R. O et al.SPIE proceedings series. 1998, pp 381-392, isbn 0-8194-2986-4Conference Paper

Fault-detection in syndrome testing of digital circuitsRANA EJAZ AHMED.International journal of electronics. 1993, Vol 75, Num 2, pp 345-348, issn 0020-7217Article

On using signature registers as pseudorandom pattern generators in built-in self-testingKWANGHYUN KIM; DONG SAM HA; TRONT, J. G et al.IEEE transactions on computer-aided design of integrated circuits and systems. 1988, Vol 7, Num 8, pp 919-928, issn 0278-0070Article

Biochemical pathway analysis via signature miningPANTERIS, Eleftherios; SWIFT, Stephen; PAYNE, Annette et al.Lecture notes in computer science. 2005, pp 12-23, issn 0302-9743, isbn 3-540-29104-0, 1Vol, 12 p.Conference Paper

X-tolerant signature analysisMITRA, Subhasish; LUMETTA, Steven S; MITZENMACHER, Michael et al.International Test Conference. 2004, pp 432-441, isbn 0-7803-8580-2, 1Vol, 10 p.Conference Paper

Substation component identification for infrared thermographersGIESECKE, J. L.SPIE proceedings series. 1997, pp 153-163, isbn 0-8194-2471-4Conference Paper

Techniques et outils de CAO pour la génération automatique de BIST et DFT pour RAMs = Techniques and CAD tools for automatic generation of BIST and DFT for RAMSKebichi, Omar; Nicolaidis, M.1994, 169 p.Thesis

Design of self-diagnostic boards by multiple signature analysisKARPOVSKY, M. G; CHAUDHRY, S. M.IEEE transactions on computers. 1993, Vol 42, Num 9, pp 1035-1044, issn 0018-9340Article

An investigation of the information contained in faulty signaturesCHAN, J. C.Microelectronics and reliability. 1992, Vol 32, Num 7, pp 935-940, issn 0026-2714Article

The construction of collision messages for hash functionsIWATA, M; OHTA, K; MIYAGUCHI, S et al.Transactions of the Institute of Electronics and Communication Engineers of Japan. Section E. 1990, Vol 73, Num 7, pp 1100-1106, issn 0387-236XArticle

  • Page / 11