Sciweavers

56 search results - page 11 / 12
» Cryptographic properties of nonlinear pseudorandom number ge...
Sort
View
TEC
2008
118views more  TEC 2008»
13 years 7 months ago
RM-MEDA: A Regularity Model-Based Multiobjective Estimation of Distribution Algorithm
Under mild conditions, it can be induced from the Karush-Kuhn-Tucker condition that the Pareto set, in the decision space, of a continuous multiobjective optimization problem is (m...
Qingfu Zhang, Aimin Zhou, Yaochu Jin
CTRSA
2009
Springer
128views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Short Redactable Signatures Using Random Trees
Abstract. A redactable signature scheme for a string of objects supports verification even if multiple substrings are removed from the original string. It is important that the re...
Ee-Chien Chang, Chee Liang Lim, Jia Xu
IFIP
2005
Springer
14 years 28 days ago
Content-Based Image Retrieval for Digital Forensics
Digital forensic investigators are often faced with the task of manually examining a large number of (photographic) images in order to identify potential evidence. The task can be...
Yixin Chen, Vassil Roussev, Golden G. Richard III,...
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
BC
2005
101views more  BC 2005»
13 years 7 months ago
A control theory approach to the analysis and synthesis of the experimentally observed motion primitives
Recent experiments on frogs and rats, have led to the hypothesis that sensory-motor systems are organized into a finite number of linearly combinable modules; each module generates...
Francesco Nori, Ruggero Frezza