Sciweavers

1610 search results - page 274 / 322
» Identity Based Multisignatures
Sort
View
CORR
2007
Springer
149views Education» more  CORR 2007»
13 years 9 months ago
Graph Entropy, Network Coding and Guessing games
We introduce the (private) entropy of a directed graph (in a new network coding sense) as well as a number of related concepts. We show that the entropy of a directed graph is ide...
Søren Riis
CSDA
2007
100views more  CSDA 2007»
13 years 9 months ago
Estimation in a linear multivariate measurement error model with a change point in the data
A linear multivariate measurement error model AX = B is considered. The errors in A B are row-wise finite dependent, and within each row, the errors may be correlated. Some of th...
Alexander Kukush, Ivan Markovsky, Sabine Van Huffe...
JAIR
2006
110views more  JAIR 2006»
13 years 9 months ago
Domain Adaptation for Statistical Classifiers
The most basic assumption used in statistical learning theory is that training data and test data are drawn from the same underlying distribution. Unfortunately, in many applicati...
Hal Daumé III, Daniel Marcu
JCSS
2006
102views more  JCSS 2006»
13 years 9 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
JHSN
2006
267views more  JHSN 2006»
13 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...