Sciweavers

6574 search results - page 6 / 1315
» Current Signatures: Application
Sort
View
JOC
2006
116views more  JOC 2006»
13 years 9 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
BIOCOMP
2006
13 years 10 months ago
Finding Molecular Signature of Prostate Cancer: An Algorithmic Approach
123 African American men in America are 65% more likely to develop prostate cancer and are two to three times more likely to die of the disease than Caucasian men [1]. While resear...
Patrick Bobbie, Renee Reams, Sandra Suther, C. Per...
JOT
2006
119views more  JOT 2006»
13 years 9 months ago
An efficient multiversion access control in a Temporal Object Oriented Database
Many data base applications require the storage and manipulation of different versions of data objects. To satisfy the diverse needs of these applications, current database system...
Gurusamy Arumugam, Muthuraman Thangaraj
CTRSA
2005
Springer
221views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Accumulators from Bilinear Pairings and Applications
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constru...
Lan Nguyen
EUROPKI
2008
Springer
13 years 10 months ago
Efficient Generic Forward-Secure Signatures and Proxy Signatures
We propose a generic method to construct forward-secure signature schemes from standard signature schemes. The proposed construction is more computationally efficient than previous...
Basel Alomair, Krishna Sampigethaya, Radha Poovend...