Sciweavers

294 search results - page 46 / 59
» Efficient Confirmer Signatures from the
Sort
View
CCS
2006
ACM
14 years 1 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
JCP
2006
116views more  JCP 2006»
13 years 9 months ago
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture
Trust models provide a framework to create and manage trust relationships among the different entities of a Public Key Infrastructure (PKI). These trust relationships are verified ...
Cristina Satizábal, Rafael Páez, Jor...
CVPR
1997
IEEE
14 years 12 months ago
Representation Of Objects In A Volumetric Frequency Domain With Application To Face Recognition
A novel method for representing 3-D objects that unifies viewer and model centered object representations is presented. A unified 3-D frequency-domain representation (called Volum...
Jezekiel Ben-Arie, Dibyendu Nandy
GLOBECOM
2007
IEEE
14 years 4 months ago
Performing Packet Content Inspection by Longest Prefix Matching Technology
—This article presents a novel mechanism to perform packet content inspection by longest prefix matching (LPM) technology. It is done by transforming the automaton-based state ta...
Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu, Chia-Wen H...
CIS
2009
Springer
14 years 1 months ago
A Hierarchical Artificial Immune Model for Virus Detection
Abstract-- As viruses become more complex, existing antivirus methods are inefficient to detect various forms of viruses, especially new variants and unknown viruses. Inspired by i...
Wei Wang, Pengtao Zhang, Ying Tan, Xingui He