Sciweavers

6555 search results - page 1298 / 1311
» Secure attribute-based systems
Sort
View
ASIACRYPT
2000
Springer
14 years 29 days ago
Cryptanalysis of the TTM Cryptosystem
Abstract. In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building ...
Louis Goubin, Nicolas Courtois
SIGGRAPH
1999
ACM
14 years 28 days ago
Multi-color and Artistic Dithering
A multi-color dithering algorithm is proposed, which converts a barycentric combination of color intensities into a multi-color nonoverlapping surface coverage. Multi-color dither...
Victor Ostromoukhov, Roger D. Hersch
ICSE
1999
IEEE-ACM
14 years 27 days ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
HPDC
1996
IEEE
14 years 24 days ago
Legion - A View from 50, 000 Feet
' The coming of giga-bit networks makes possible the realization ofa single nationwide virtual computer comprised of a variety of geographically distributed highpe6ormance mac...
Andrew S. Grimshaw, William A. Wulf
EUROCRYPT
1990
Springer
14 years 20 days ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
« Prev « First page 1298 / 1311 Last » Next »