Sciweavers

766 search results - page 102 / 154
» How to Read a Signature
Sort
View
JOCN
2011
67views more  JOCN 2011»
13 years 3 months ago
Reasoning with Exceptions: An Event-related Brain Potentials Study
■ Defeasible inferences are inferences that can be revised in the light of new information. Although defeasible inferences are pervasive in everyday communication, little is kno...
Judith Pijnacker, Bart Geurts, Michiel van Lambalg...
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
RAID
2004
Springer
14 years 2 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
EUROCRYPT
1999
Springer
14 years 1 months ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart
ICDE
2006
IEEE
186views Database» more  ICDE 2006»
14 years 10 months ago
Energy-Efficient Continuous Isoline Queries in Sensor Networks
Environmental monitoring is a promising application for sensor networks. Many scenarios produce geographically correlated readings, making them visually interesting and good targe...
Adam Silberstein, Jun Yang 0001, Rebecca Braynard