Sciweavers

915 search results - page 38 / 183
» Proof labeling schemes
Sort
View
IJSN
2007
94views more  IJSN 2007»
13 years 7 months ago
On security proof of McCullagh?Barreto's key agreement protocol and its variants
: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation...
Zhaohui Cheng, Liqun Chen
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
14 years 7 days ago
Provably Secure Partially Blind Signatures
Partially blind signature schemes are an extension of blind signature schemes that allow a signer to explicitly include necessary information (expiration date, collateral condition...
Masayuki Abe, Tatsuaki Okamoto
CADE
2003
Springer
14 years 8 months ago
Source-Tracking Unification
We propose a practical path-based framework for deriving and simplifying source-tracking information for term unification in the empty theory. Such a framework is useful for debugg...
Venkatesh Choppella, Christopher T. Haynes
CVPR
2008
IEEE
14 years 10 months ago
Active microscopic cellular image annotation by superposable graph transduction with imbalanced labels
Systematic content screening of cell phenotypes in microscopic images has been shown promising in gene function understanding and drug design. However, manual annotation of cells ...
Jun Wang, Shih-Fu Chang, Xiaobo Zhou, Stephen T. C...
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
13 years 11 months ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno