Sciweavers

9210 search results - page 1608 / 1842
» Analyzing Real-Time Systems
Sort
View
SCN
2008
Springer
194views Communications» more  SCN 2008»
13 years 10 months ago
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
We improve our proposal of a new variant of the McEliece cryptosystem based on QC-LDPC codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to now,...
Marco Baldi, Marco Bodrato, Franco Chiaraluce
PRL
2006
163views more  PRL 2006»
13 years 10 months ago
3D target recognition using cooperative feature map binding under Markov Chain Monte Carlo
A robust and effective feature map integration method is presented for infrared (IR) target recognition. Noise in an IR image makes a target recognition system unstable in pose es...
Sungho Kim, In-So Kweon
RE
2006
Springer
13 years 10 months ago
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling
In goal-oriented requirements engineering (GORE), one usually proceeds from a goal analysis to a requirements specification, usually of IT systems. In contrast, we consider the us...
Jaap Gordijn, Michaël Petit, Roel Wieringa
SAC
2006
ACM
13 years 10 months ago
Transformation of yEPC business process models to YAWL
Model transformations are frequently applied in business process modeling to bridge between languages on a different abstraction and formality. In this paper, we define a transfor...
Jan Mendling, Michael Moser, Gustaf Neumann
IJISEC
2007
87views more  IJISEC 2007»
13 years 10 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
« Prev « First page 1608 / 1842 Last » Next »