Sciweavers

152 search results - page 21 / 31
» On Signatures of Knowledge
Sort
View
DAM
2006
97views more  DAM 2006»
13 years 8 months ago
Entity authentication schemes using braid word reduction
Abstract. Artin's braid groups currently provide a promising background for cryptographical applications, since the first cryptosystems using braids were introduced in [2, 3, ...
Hervé Sibert, Patrick Dehornoy, Marc Giraul...
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 8 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
FLAIRS
2006
13 years 9 months ago
Fuzzy Model Optimization Using Genetic Algorithm for Aircraft Engine Diagnosis
An accurate and up-to-date diagnostic model is critical for economic aircraft engine operation. However, for many commercial airline fleets, monitoring and diagnosing engine fault...
LiJie Yu, Daniel J. Cleary, Mark D. Osborn, Vrinda...
COMPSAC
2010
IEEE
13 years 6 months ago
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System
Enterprise systems are load tested for every added feature, software updates and periodic maintenance to ensure that the performance demands on system quality, availability and res...
Haroon Malik, Bram Adams, Ahmed E. Hassan, Parmind...
ICAIL
2007
ACM
14 years 9 days ago
Essential deduplication functions for transactional databases in law firms
As massive document repositories and knowledge management systems continue to expand, in proprietary environments as well as on the Web, the need for duplicate detection becomes i...
Jack G. Conrad, Edward L. Raymond