Sciweavers

1834 search results - page 226 / 367
» Public Key Cryptography
Sort
View
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 9 months ago
Providing Data Group Anonymity Using Concentration Differences
Public access to digital data can turn out to be a cause of undesirable information disclosure. That's why it is vital to somehow protect the data before publishing. There are...
Oleg Chertov, Dan Tavrov
AAECC
2006
Springer
109views Algorithms» more  AAECC 2006»
13 years 9 months ago
Cryptosystems using Linear Groups
Several suggestions are presented for developing cryptosystems, both classical and public key, using a combination of combinatorial group theory and linear groups. In particular, t...
Gilbert Baumslag, Benjamin Fine, Xiaowei Xu
ENTCS
2008
100views more  ENTCS 2008»
13 years 9 months ago
Implementing an EJB3-Specific Graph Transformation Plugin by Using Database Independent Queries
The current paper presents a novel approach to implement a graph transformation engine as an EJB3-specific plugin by using EJB QL queries for pattern matching. The essence of the ...
Gergely Varró
CSJM
2006
114views more  CSJM 2006»
13 years 9 months ago
Cryptoschemes Based on New Signature Formation Mechanism
Several variants of new digital signature schemes (DSS) based on the discrete logarithm and factorization problems have been proposed. Considered DSS are characterized in that a n...
Alexander A. Moldovyan, Dmitriy N. Moldovyan, L. V...
TNN
2008
81views more  TNN 2008»
13 years 9 months ago
Nonlinear Knowledge-Based Classification
Prior knowledge over general nonlinear sets is incorporated into nonlinear kernel classification problems as linear constraints in a linear program. The key tool in this incorpora...
Olvi L. Mangasarian, Edward W. Wild