Sciweavers

1528 search results - page 8 / 306
» On Signatures for Communication Graphs
Sort
View
IJNSEC
2011
239views more  IJNSEC 2011»
13 years 2 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
APSEC
2004
IEEE
13 years 11 months ago
Accurate Call Graph Extraction of Programs with Function Pointers Using Type Signatures
Software engineers need to understand programs in order to effectively maintain them. The call graph, which presents the calling relationships between functions, is a useful repre...
Darren C. Atkinson
SCN
2010
Springer
127views Communications» more  SCN 2010»
13 years 5 months ago
Get Shorty via Group Signatures without Encryption
Patrik Bichsel, Jan Camenisch, Gregory Neven, Nige...
DATESO
2004
134views Database» more  DATESO 2004»
13 years 9 months ago
Designing Indexing Structure for Discovering Relationships in RDF Graphs
Discovering the complex relationships between entities is one way of benefitting from the Semantic Web. This paper discusses new approaches to implementing -operators into RDF quer...
Stanislav Barton
IJCAI
1993
13 years 8 months ago
Using Local Information in a Non-Local Way for Mapping Graph-Like Worlds
This paper describes a technique whereby an autonomous agent such as a mobile robot can explore an unknown environment and make a topologicalmapofit. It is assumedthat the environ...
Gregory Dudek, Paul Freedman, Souad Hadjres