Sciweavers

1094 search results - page 154 / 219
» List signature schemes
Sort
View
COMPSAC
2004
IEEE
13 years 11 months ago
On the Complexity of Finding Emerging Patterns
Emerging patterns have been studied as a useful type of pattern for the diagnosis and understanding of diseases based on the analysis of gene expression profiles. They are useful ...
Lusheng Wang, Hao Zhao, Guozhu Dong, Jianping Li
ENC
2004
IEEE
13 years 11 months ago
On the Hardware Design of an Elliptic Curve Cryptosystem
We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature....
Miguel Morales-Sandoval, Claudia Feregrino Uribe
ACISP
2010
Springer
13 years 9 months ago
Predicate-Based Key Exchange
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session ke...
James Birkett, Douglas Stebila
SSR
1997
93views more  SSR 1997»
13 years 9 months ago
Using Content-Derived Names for Configuration Management
Configuration management of compiled software artifacts (programs, libraries, icons, etc.) is a growing problem as software reuse becomes more prevalent. For an application compos...
Jeffrey K. Hollingsworth, Ethan L. Miller
ACL
1993
13 years 9 months ago
A Complete and Recursive Feature Theory
Various feature descriptions are being employed in constrained-based grammar formalisms. The common notational primitive of these descriptions are functional attributes called fea...
Rolf Backofen, Gert Smolka