Sciweavers

985 search results - page 106 / 197
» On the validity of digital signatures
Sort
View
CGVR
2006
13 years 11 months ago
Design Issues and Challenges of 3-D Object Modeling and 2-D Rendering
- The challenges in modeling 3-D objects using facets and surface patches are investigated, and enhancement over the Gouraud's and Phong's interpolative shading is presen...
Omar Aboutalib, Bea Thai
ACL
1993
13 years 11 months ago
A Complete and Recursive Feature Theory
Various feature descriptions are being employed in constrained-based grammar formalisms. The common notational primitive of these descriptions are functional attributes called fea...
Rolf Backofen, Gert Smolka
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 10 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
CCS
2005
ACM
14 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
HT
2003
ACM
14 years 3 months ago
The connectivity sonar: detecting site functionality by structural patterns
Web sites today serve many different functions, such as corporate sites, search engines, e-stores, and so forth. As sites are created for different purposes, their structure and...
Einat Amitay, David Carmel, Adam Darlow, Ronny Lem...