Sciweavers

625 search results - page 80 / 125
» Generalized Ring Signatures
Sort
View
ACL
1993
13 years 9 months ago
A Complete and Recursive Feature Theory
Various feature descriptions are being employed in constrained-based grammar formalisms. The common notational primitive of these descriptions are functional attributes called fea...
Rolf Backofen, Gert Smolka
ENTCS
2007
116views more  ENTCS 2007»
13 years 7 months ago
A Logical Characterisation of Static Equivalence
The work of Abadi and Fournet introduces the notion of a frame to describe the knowledge of the environment of a cryptographic protocol. Frames are lists of terms; two frames are ...
Hans Hüttel, Michael D. Pedersen
ICFHR
2010
139views Biometrics» more  ICFHR 2010»
13 years 2 months ago
A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods
Abstract--Doodle-based graphical passwords represent a challenging scenario due to their high variability and the tendency to be graphically simple. Despite this, doodle-based auth...
Marcos Martinez-Diaz, C. Martin-Diaz, Javier Galba...
ASPLOS
2012
ACM
12 years 3 months ago
DejaVu: accelerating resource allocation in virtualized environments
Effective resource management of virtualized environments is a challenging task. State-of-the-art management systems either rely on analytical models or evaluate resource allocati...
Nedeljko Vasic, Dejan M. Novakovic, Svetozar Miuci...
FC
2000
Springer
127views Cryptology» more  FC 2000»
13 years 11 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung