Sciweavers

1834 search results - page 268 / 367
» Public Key Cryptography
Sort
View
ISICT
2003
13 years 9 months ago
Structure free highway toll collection using non-repudiated tickets
This paper proposes a concept of how to collect toll on highways. Unlike any existing method, the proposed approach requires no structure to be built on highways for the toll coll...
Nol Premasathian, Somying Thainimit
ECIS
2000
13 years 9 months ago
The Government's Role in Improving Electronic Commerce Adoption
Electronic commerce has been introduced to the business community at a very fast pace. The Internet's ease of use in particular resulted to a rapid growth of electronic transa...
Anastasia Papazafeiropoulou, Athanasia Pouloudi
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 8 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
CJ
2006
100views more  CJ 2006»
13 years 8 months ago
Deterministic Identity-Based Signatures for Partial Aggregation
Aggregate signatures are a useful primitive which allows to aggregate into a single and constant-length signature many signatures on different messages computed by different users...
Javier Herranz
ENTCS
2006
184views more  ENTCS 2006»
13 years 7 months ago
Scannerless Boolean Parsing
Scannerless generalized parsing techniques allow parsers to be derived directly from unified, declarative specifications. Unfortunately, in order to uniquely parse existing progra...
Adam Megacz