Sciweavers

1094 search results - page 164 / 219
» List signature schemes
Sort
View
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 7 months ago
Similarity-based Reasoning in Qualified Logic Programming
Similarity-based Logic Programming (briefly, SLP) has been proposed to enhance the LP paradigm with a kind of approximate reasoning which supports flexible information retrieval a...
Rafael Caballero, Mario Rodríguez-Artalejo,...
IJSN
2008
80views more  IJSN 2008»
13 years 7 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
CORR
2004
Springer
107views Education» more  CORR 2004»
13 years 7 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
JCIT
2010
131views more  JCIT 2010»
13 years 2 months ago
A Secure Routing Protocol for Peer-to-Peer Network
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To...
Xu Xiang, Jianguo Chen
IACR
2011
101views more  IACR 2011»
12 years 7 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song