Sciweavers

1610 search results - page 41 / 322
» Identity Based Multisignatures
Sort
View
IDEAL
2010
Springer
13 years 6 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
ENDM
2002
113views more  ENDM 2002»
13 years 8 months ago
On robust cycle bases
Two types of robust cycle bases are defined via recursively nice arrangements; complete and bipartite complete graphs are shown to have such bases. It is shown that a diagram in a...
Paul C. Kainen
DRM
2003
Springer
14 years 1 months ago
Breaking and repairing optimistic fair exchange from PODC 2003
In PODC 2003, Park, Chong, Siegel and Ray [22] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is totally breakable already...
Yevgeniy Dodis, Leonid Reyzin
CDC
2009
IEEE
113views Control Systems» more  CDC 2009»
14 years 1 months ago
Decomposition based least squares estimation algorithm for non-uniformly sampled multirate systems
— In order to reduce the computational load of the recursive least squares (RLS) algorithm, a decomposition based least squares algorithm is developed for non-uniformly sampled m...
Yanjun Liu, Feng Ding
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
14 years 2 months ago
Hardware Acceleration of the Tate Pairing in Characteristic Three
Although identity based cryptography offers many functional advantages over conventional public key alternatives, the computational costs are significantly greater. The core comp...
Philipp Grabher, Dan Page