Sciweavers

780 search results - page 46 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
ACISP
2004
Springer
14 years 1 months ago
Weak Property of Malleability in NTRUSign
A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in a NTRU lattice was proposed at CT-RSA’03. However no security proof ...
SungJun Min, Go Yamamoto, Kwangjo Kim
JCM
2007
143views more  JCM 2007»
13 years 7 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
WWIC
2007
Springer
156views Communications» more  WWIC 2007»
14 years 1 months ago
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
Providing security services for wireless sensor networks plays a vital role in secure network operation especially when sensor networks are deployed in hostile areas. In order to p...
Tran Thanh Dai, Choong Seon Hong
JUCS
2007
186views more  JUCS 2007»
13 years 7 months ago
An Hybrid Fuzzy Variable Neighborhood Particle Swarm Optimization Algorithm for Solving Quadratic Assignment Problems
: Recently, Particle Swarm Optimization (PSO) algorithm has exhibited good performance across a wide range of application problems. A quick review of the literature reveals that re...
Hongbo Liu, Ajith Abraham
SSIAI
2000
IEEE
14 years 5 days ago
Multi-Level Shape Recognition Based on Wavelet-Transform Modulus Maxima
In this paper we propose a new approach to shape recognition based on the wavelet transform modulus maxima. And apply it to the problem of content-based indexing and retrieval of ...
Faouzi Alaya Cheikh, Azhar Quddus, Moncef Gabbouj