Sciweavers

103 search results - page 12 / 21
» Asymmetric Concurrent Signatures
Sort
View
CCS
2006
ACM
13 years 10 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
ICASSP
2009
IEEE
14 years 1 months ago
Relative pitch estimation of multiple instruments
We present an algorithm based on probabilistic latent component analysis and employ it for relative pitch estimation of multiple instruments in polyphonic music. A multilayered po...
Gautham J. Mysore, Paris Smaragdis
ASIAN
1998
Springer
118views Algorithms» more  ASIAN 1998»
13 years 11 months ago
Bisimulation Lattice of Chi Processes
Chi calculus was proposed as a process algebra that has a uniform treatment of names. The paper carries out a systematic study of bisimilarities for chi processes. The notion of L-...
Yuxi Fu
ESOP
2005
Springer
14 years 7 days ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
AINA
2007
IEEE
13 years 10 months ago
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Ki-Woong Park, Hyunchul Seok, Kyu Ho Park