Sciweavers

1116 search results - page 123 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
HICSS
2006
IEEE
105views Biometrics» more  HICSS 2006»
14 years 1 months ago
Unified Information Models in Support of Location Transparency for Future Utility Applications
For future scenarios of power system operations, like the self healing grid vision, system and communications architecture are key. Applications will require unlimited access to a...
Otto Preiss, Tatjana Kostic
CIS
2005
Springer
14 years 1 months ago
ID-Based Restrictive Partially Blind Signatures
Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain...
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
SETA
2004
Springer
122views Mathematics» more  SETA 2004»
14 years 1 months ago
New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP)
In order to reduce key sizes and bandwidth, cryptographic systems have been proposed using minimal polynomials to represent finite field elements. These systems are essentially e...
Kenneth J. Giuliani, Guang Gong
DAIS
2003
13 years 9 months ago
Jironde: A Flexible Framework for Making Components Transactional
Abstract. It is generally agreed that one of the key services of componentbased systems are transactions. However, an agreement on how components should be involved in transactions...
Marek Prochazka
IANDC
2007
126views more  IANDC 2007»
13 years 7 months ago
Alternating two-way AC-tree automata
We explore the notion of alternating two-way tree automata modulo the theory of finitely many associative-commutative (AC) symbols. This was prompted by questions arising in cryp...
Kumar Neeraj Verma, Jean Goubault-Larrecq