Sciweavers

1628 search results - page 55 / 326
» Compiler Construction Using Scheme
Sort
View
EUC
2004
Springer
14 years 3 months ago
VChord: Constructing Peer-to-Peer Overlay Network by Exploiting Heterogeneity
High heterogeneity is an unignoring factor for large-scale peer-to-peer system which leads to the born of VChord. VChord is a peer-to-peer overlay network constructed on Chord aime...
Feng Hong, Minglu Li, Xinda Lu, Yi Wang, Jiadi Yu,...
CGF
2000
106views more  CGF 2000»
13 years 10 months ago
Constructive Volume Geometry
: Having evolved from volume visualisation, volume graphics is emerging as an important sub-field of computer graphics. This paper focuses on a fundamental aspect of volume graphic...
Min Chen, J. V. Tucker
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 7 months ago
Efficient Certificateless KEM in the Standard Model
Abstract. We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed ...
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
13 years 12 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
14 years 1 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...