Sciweavers

146 search results - page 13 / 30
» Sequential Traitor Tracing
Sort
View
ICISC
2007
100views Cryptology» more  ICISC 2007»
13 years 10 months ago
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm
Pairing based cryptography is a new public key cryptographic scheme. An elliptic curve suitable for pairing based cryptography is called a “pairing-friendly” elliptic curve. Af...
Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
CMS
2006
13 years 10 months ago
Perturbing and Protecting a Traceable Block Cipher
At the Asiacrypt 2003 conference Billet and Gilbert introduce a block cipher, which, to quote them, has the following paradoxical traceability properties: it is computationally ea...
Julien Bringer, Hervé Chabanne, Emmanuelle ...
FLAIRS
2004
13 years 10 months ago
Discovering Causal Chains by Integrating Plan Recognition and Sequential Pattern Mining
In this paper we define the notion of causal chains. Causal chains are a particular kind of sequential patterns that reflect causality relations according to background knowledge....
Shreeram Sahasrabudhe, Héctor Muñoz-...
LOGCOM
2008
89views more  LOGCOM 2008»
13 years 9 months ago
Sequentially Indexed Grammars
This paper defines the grammar class of sequentially indexed grammars (SIGs) that results of a change in the index stack handling mechanism of indexed grammars [Aho68, Aho69]. SIG...
Jan van Eijck
ICPP
2007
IEEE
14 years 3 months ago
Automatic Trace-Based Parallelization of Java Programs
We propose and evaluate a novel approach for automatic parallelization. The approach uses traces as units of parallel work. We discuss the benefits and challenges of the use of t...
Borys J. Bradel, Tarek S. Abdelrahman