Sciweavers

1834 search results - page 282 / 367
» Public Key Cryptography
Sort
View
IADIS
2004
13 years 9 months ago
Dimensions of Facilitators for Non-Business E-Commerce Adoption
Non-business EC is a relatively new research niche in the general e-commerce stream. It denotes the use of e-commerce by non-business institutions such as academic institutions (a...
Nelson Oly Ndubisi, M. A. Masmurniwati
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 9 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
I3E
2003
72views Business» more  I3E 2003»
13 years 9 months ago
Reducing Normative and Informative Asymmetries in Fiscal Management for Local Administrations
: Fiscal incomes are vital for Governments, both for central and local agencies, therefore on-line fiscal services will play a key role in the e-Government perspective. The creatio...
M. Carducci, Mario A. Bochicchio, Antonella Longo
MM
2010
ACM
170views Multimedia» more  MM 2010»
13 years 8 months ago
Training data collection system for a learning-based photographic aesthetic quality inference engine
We present a novel data collection system deployed for the ACQUINE - Aesthetic Quality Inference Engine. The goal of the system is to collect online user opinions, both structured...
Razvan Orendovici, James Ze Wang
CSJM
2006
77views more  CSJM 2006»
13 years 7 months ago
An Approach to Shorten Digital Signature Length
A new method is proposed to design short signature schemes based on difficulty of factorizing a composite number n = qr, where q and r are two large primes. Using the method new d...
Nikolay A. Moldovyan