Sciweavers

315 search results - page 3 / 63
» Claims Analysis
Sort
View
ACISP
2005
Springer
14 years 29 days ago
Security Analysis and Fix of an Anonymous Credential System
Anonymous credentials are an important privacy-enhancing technique that allows users to convince a service provider of their legitimacy for service accesses in an anonymous manner....
Yanjiang Yang, Feng Bao, Robert H. Deng
CORR
2011
Springer
187views Education» more  CORR 2011»
13 years 2 months ago
Failure of A Mix Network
A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantages in security and efficiency are compromised. The analysis in this paper illus...
Kun Peng
EMO
2005
Springer
175views Optimization» more  EMO 2005»
14 years 28 days ago
A New Analysis of the LebMeasure Algorithm for Calculating Hypervolume
We present a new analysis of the LebMeasure algorithm for calculating hypervolume. We prove that although it is polynomial in the number of points, LebMeasure is exponential in the...
R. Lyndon While
ICCBR
2005
Springer
14 years 28 days ago
The Role of Syntactic Analysis in Textual Case Retrieval
In this paper, we argue that syntactic analysis is most likely to improve retrieval accuracy in textual case-based reasoning when the task of the system is well-defined and the re...
Bradford W. Mott, James C. Lester, Karl Branting
ISSA
2008
13 years 8 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas