Sciweavers

625 search results - page 100 / 125
» Generalized Ring Signatures
Sort
View
WPES
2004
ACM
14 years 1 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
IH
2004
Springer
14 years 1 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
OOPSLA
2004
Springer
14 years 1 months ago
Super and inner: together at last!
In an object-oriented language, a derived class may declare a method with the same signature as a method in the base class. The meaning of the re-declaration depends on the langua...
David S. Goldberg, Robert Bruce Findler, Matthew F...
APSEC
2003
IEEE
14 years 1 months ago
Ensuring Compatible Interactions within Component-based Software Systems
The interface definition of a component in a distributed system forms the contract between the component itself and its neighbouring components regarding the use of its services....
Jun Han, Ksze Kae Ker
ICDAR
2003
IEEE
14 years 1 months ago
Recovery of Writing Sequence of Static Images of Handwriting using UWM
It is generally agreed that an on-line recognition system is always reliable than an off-line one. It is due to the availability of the dynamic information, especially the writing...
Kai Kwong Lau, Pong Chi Yuen, Yuan Yan Tang