Sciweavers

135 search results - page 21 / 27
» Attribute-based signature and its applications
Sort
View
CCS
2001
ACM
13 years 12 months ago
Delegation of cryptographic servers for capture-resilient devices
Abstract. A device that performs private key operations (signatures or decryptions), and whose private key operations are protected by a password, can be immunized against offline...
Philip D. MacKenzie, Michael K. Reiter
CSFW
2010
IEEE
13 years 11 months ago
A Machine-Checked Formalization of Sigma-Protocols
—Zero-knowledge proofs have a vast applicability in the domain of cryptography, stemming from the fact that they can be used to force potentially malicious parties to abide by th...
Gilles Barthe, Daniel Hedin, Santiago Zanella B&ea...
PAA
2008
13 years 7 months ago
Diagnosis of lung nodule using Moran's index and Geary's coefficient in computerized tomography images
This paper analyzes the application of Moran's index and Geary's coefficient to the characterization of lung nodules as malignant or benign in computerized tomography ima...
Erick Corrêa da Silva, Aristófanes Co...
INFOCOM
2012
IEEE
11 years 10 months ago
WILL: Wireless indoor localization without site survey
—Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require a ...
Chenshu Wu, Zheng Yang, Yunhao Liu, Wei Xi
SIGSOFT
2009
ACM
14 years 2 months ago
Automatic synthesis of behavior protocols for composable web-services
Web-services are broadly considered as an effective means to achieve interoperability between heterogeneous parties of a business process and offer an open platform for developing...
Antonia Bertolino, Paola Inverardi, Patrizio Pelli...