Sciweavers

625 search results - page 11 / 125
» Generalized Ring Signatures
Sort
View
HT
2003
ACM
14 years 22 days ago
The connectivity sonar: detecting site functionality by structural patterns
Web sites today serve many different functions, such as corporate sites, search engines, e-stores, and so forth. As sites are created for different purposes, their structure and...
Einat Amitay, David Carmel, Adam Darlow, Ronny Lem...
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
14 years 21 days ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
CHI
2010
ACM
14 years 2 months ago
Tangible spin cube for 3D ring menu in real space
In this paper, we introduce a novel interface, the Tangible Spin Cube, for experiencing a 3D ring menu in real space. It enables a tangible object-referenced 3D ring menu and its ...
Hyeongmook Lee, Woontack Woo
JSC
2010
63views more  JSC 2010»
13 years 5 months ago
Normalization of rings
We present a new algorithm to compute the integral closure of a reduced Noetherian ring in its total ring of fractions. A modification, applicable in positive characteristic, whe...
Gert-Martin Greuel, Santiago Laplagne, Frank Seeli...
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 7 months ago
Repairing Efficient Threshold Group Signature Scheme
To enhance the efficiency of threshold group signature schemes, Yu and Chen, recently, proposed an efficient threshold group signature scheme. By using elliptic curves, the propos...
Zuhua Shao