Sciweavers

1094 search results - page 188 / 219
» List signature schemes
Sort
View
TJS
2010
117views more  TJS 2010»
13 years 2 months ago
Adaptive service scheduling for workflow applications in Service-Oriented Grid
When the workflow application is executed in Service-Oriented Grid (SOG), performance issues such as service scheduling should be considered, to achieve high and stable performance...
Sung-Ho Chin, Taeweon Suh, Heon-Chang Yu
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 1 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
EUROCRYPT
1999
Springer
13 years 11 months ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 8 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
CIVR
2007
Springer
195views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Towards optimal bag-of-features for object categorization and semantic video retrieval
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as ...
Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang 0003