Sciweavers

1094 search results - page 103 / 219
» List signature schemes
Sort
View
CARDIS
2010
Springer
162views Hardware» more  CARDIS 2010»
14 years 1 months ago
On the Design and Implementation of an Efficient DAA Scheme
Abstract. Direct Anonymous Attestation (DAA) is an anonymous digital signature scheme that aims to provide both signer authentication and privacy. One of the properties that makes ...
Liqun Chen, Dan Page, Nigel P. Smart
ENTCS
2010
90views more  ENTCS 2010»
13 years 10 months ago
Recursive Program Schemes and Context-Free Monads
Solutions of recursive program schemes over a given signature were characterized by Bruno Courcelle as precisely the context-free (or algebraic) -trees. These are the finite and ...
Jirí Adámek, Stefan Milius, Jiri Vel...
EUROPKI
2007
Springer
14 years 4 months ago
Undeniable Mobile Billing Schemes
An undeniable mobile billing system allows a mobile network service provider to bill its subscribers with trustworthy evidences. Chen, Jan and Chen proposed such a billing system b...
Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen
DAM
2006
97views more  DAM 2006»
13 years 10 months ago
Entity authentication schemes using braid word reduction
Abstract. Artin's braid groups currently provide a promising background for cryptographical applications, since the first cryptosystems using braids were introduced in [2, 3, ...
Hervé Sibert, Patrick Dehornoy, Marc Giraul...
IGARSS
2009
13 years 7 months ago
Optimum Sampling Scheme for Characterization of Mine Tailings
The paper describes a novice method for sampling geochemicals to characterize mine tailings. We model the spatial relationships between a multi-element signature and, as covariate...
Pravesh Debba, Emmanuel John M. Carranza, Alfred S...