As the most pervasive method of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effectiv...
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Abstract. This paper presents the ADenoIdS intrusion detection system (IDS). ADenoIdS takes some architectural inspiration from the human immune system and automates intrusion reco...
This paper presents a new concept for 3D coding of freeform surfaces. The proposed coding technique uses the surface signature representation scheme [1]. This representation schem...
Abstract: We propose a framework for the specification of extensible database systems. A particular goal is to implement a software component for parsing and rule-based optimizatio...