Sciweavers

9210 search results - page 1608 / 1842
» Analyzing Real-Time Systems
Sort
View
145
Voted
SCN
2008
Springer
194views Communications» more  SCN 2008»
15 years 2 months ago
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
We improve our proposal of a new variant of the McEliece cryptosystem based on QC-LDPC codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to now,...
Marco Baldi, Marco Bodrato, Franco Chiaraluce
PRL
2006
163views more  PRL 2006»
15 years 2 months ago
3D target recognition using cooperative feature map binding under Markov Chain Monte Carlo
A robust and effective feature map integration method is presented for infrared (IR) target recognition. Noise in an IR image makes a target recognition system unstable in pose es...
Sungho Kim, In-So Kweon
RE
2006
Springer
15 years 2 months ago
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling
In goal-oriented requirements engineering (GORE), one usually proceeds from a goal analysis to a requirements specification, usually of IT systems. In contrast, we consider the us...
Jaap Gordijn, Michaël Petit, Roel Wieringa
SAC
2006
ACM
15 years 2 months ago
Transformation of yEPC business process models to YAWL
Model transformations are frequently applied in business process modeling to bridge between languages on a different abstraction and formality. In this paper, we define a transfor...
Jan Mendling, Michael Moser, Gustaf Neumann
112
Voted
IJISEC
2007
87views more  IJISEC 2007»
15 years 2 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
« Prev « First page 1608 / 1842 Last » Next »